1. Wang, B., Zheng, Y., Lou, W., Hou, Y.T.: DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw. 81, 308–319 (2015)
2. Zhang, D., Liu, D., Csallner, C., Kung, D., Lei, Y.: A distributed framework for demand-driven software vulnerability detection. J. Syst. Softw. 87, 60–73 (2014)
3. McMahon, J.: An analysis of the characteristics of cyber attacks. Discov. Invention Appl. (1) (2014)
4. Banerjee, C., Banerjee, A., Murarka, P.D.: Evaluating the relevance of prevailing software metrics to address issue of security implementation in SDLC. Int. J. Adv. Stud. Comput. Sci. Eng. 3(3), 18 (2014)
5. Banerjee, C., Pandey, S.K.: Software Security Rules, SDLC Perspective (2009).
arXiv:0911.0494