1. D. Anstee, D. Bussiere, Worldwide infrastructure security report viii (2012) [Online]. Available: https://www.arbornetworks.com/report
2. Layered intelligent ddos mitigation systems (2011) [Online]. Available: https://www.arbornetworks.com/ddos/Layered%20Intelligent%20DDoS%20Mitigation%20Systems.pdf
3. J. Sun, K. Sun, DESIR: Decoy-enhanced seamless IP randomization, in IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications (2016), pp. 1–9
4. J. Ullrich, K. Krombholz, H. Hobel, A. Dabrowski, E. Weippl, IPv6 security: Attacks and countermeasures in a nutshell, in 8th USENIX Workshop on Offensive Technologies (WOOT 14) (San Diego, CA: USENIX Association, 2014). [Online]. Available: https://www.usenix.org/conference/woot14/workshop-program/presentation/Ullrich
5. M. Wright, S. Venkatesan, M. Albanese, M.P. Wellman, Moving target defense against DDoS attacks: An empirical game-theoretic analysis, in ACM Workshop on Moving Target Defense (2016)