1. Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical Network Support for IP Traceback. In: ACM SIGCOMM conference, vol. 30. Issue 4, pp 295–306 (2000).
2. Song, D.X., Perrig, A.: Advanced and Authenticated Marking Schemes for IP Traceback. In: IEEE INFOCOM, pp. 878–886 (2001).
3. Dean, D., Franklin, M., Stubblefield, A.: An Algebraic Approach to IP Traceback. ACM Trans. Information and System Security, pp. 3–12 (2001).
4. Harsha K. Kalutarage., Siraj A. Shaikh., Indika P. Wickramasinghe., Qin Zhou., Anne E. James.: Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks. Computers and Electrical Engineering, vol. 47. pp. 327–344, (2015).
5. Park, K., Lee H.: On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial-of-Service Attacks. In: IEEE INFOCOM (2001).