1. 1. Ablett, E., D. Bellizzi, J. Byers, S. Cove, M. Dobrusin, A. Frey, J. Hanke. Encryption Advantages and Disadvantages. 2014. http://networking116.wikispaces.com/Encryption+Advantages+and+Disadvantages
2. 2. Al-Haidari, F., M. Sqalli, K. Salah. Enhanced EDo S-Shield for Mitigating EDo S Attacks Originating from Spoofed IP Addresses. - In: Proc. of 11th Int. Conf. Trust Secur. Priv. Comput. Commun., IEEE, 2012 [Cited 16 December 2016], pp. 1167-1174. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6296109
3. 3. Alosaimi, W., K. Al-Begain. A New Method to Mitigate the Impacts of Economical Denial of Sustainability Attacks Against the Cloud. - In: Proc. of 14th Annu. Post. Grad. Symp. Converg. Telecommun. Netw. Broadcating. Liverpool John Moores University, Liverpool, UK, 2013, pp. 116-121.
4. 4. Aslan, T. Cloud Physical Security Considerations. IBM Cloud, 2012 [Cited 15 February 2017]. http://thoughtsoncloud.com/index.php/2012/02/cloud-physical-security-considerations/
5. 5. Beitollahi, H., G. Deconinc k. FOSe L: Filtering by Helping an Overlay Security Layer to Mitigate Do S Attacks. - In: Proc. of 7th IEEE Int. Symp. Netw. Comput. Appl., IEEE, July 2008 [Cited 16 December 2016], pp. 19-28. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4579635