1. http://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA .
2. http://www.omnisecu.com/ccnasecurity/types-of-network-attacks.php .
3. https://security.radware.com/…/DDoS_Handbook/DDoS_Handbook.pdf .
4. ShwetaTripathi, Brij Gupta, Ammar Almomani, Anupama Mishra, Suresh Veluru, Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks”, Journal of Information Security, 2013, 4, 150–164.
5. A. ALmomani, T.-C. Wan, B. B. Gupta, A. Altaher, E. A. Lmomani and S. Ramadass, “A Survey of Phishing Email Filtering Techniques,” IEEE Communications Surveys & Tutorials, Vol. PP, No. 99, 2013, pp. 1–21.