1. Anagnostopoulos, M., Kambourakis, G., Kopanos, P., Louloudakis, G., Gritzalis, S.: DNS amplification attack revisited. Comput. Secur. 39, 475–485 (2013)
2. Angrishi, K.: Turning internet of things (IoT) into internet of vulnerabilities (IoV): IoT botnets. Preprint (2017). arXiv:1702.03681
3. Apthorpe, N., Reisman, D., Sundaresan, S., Narayanan, A., Feamster, N.: Spying on the smart home: Privacy attacks and defenses on encrypted IoT traffic. Preprint (2017). arXiv:1708.05044
4. Borella, M.S.: Source models of network game traffic. Computer Communications 23(4), 403–410 (2000)
5. Cao, T., Shen, P., Bertino, E.: Cryptanalysis of some rfid authentication protocols. J. Commun. 3(7), 20–27 (2008)