1. Threshold verification using Statistical Approach for Fast Attack Detection. Intl.;Journal of Computer Science and Information Security,2009
2. Advisory, C. E. R. T. (2010). SYN Flooding and IP Spoofing Attacks. CERT® Coordination Center Software Engineering Institute, Carnegie Mellon. Retrieved from http://www.cert.org/advisories/CA-1996-21.html
3. Beardmore, K. (2013). The Truth about DDoS Attacks: Part 1. Retrieved from TheCarbon60 Blog: http://www.carbon60.com/the-truth-about-DDOS-attacks-part-1/
4. Bhadauria, R. C. R., Chaki, N., & Sanyal, S. (2011). A survey on security issues in cloud computing. Retrieved December 5, 2014 from http://arxiv.org/abs/1109.5388
5. Chuiyi, X., Yizhi, Z., Yuan, B., Shuoshan, L., & Qin, X. (2011). A Distributed Intrusion Detection System against flooding Denial of Services attacks. 13th International Conference on, Advanced Communication Technology (ICACT).