1. A comparative study of anomaly detection algorithms for detection of SIP flooding in IMS
2. AnastasovI. (2014). Danco Davce, “SIEM Implementation for Global and Distributed Environments”. IEEE.
3. Anteneh, G., Moses, G., Jiang, L., & Chunmei, L. (2015). Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment. IEEE 12th International Conference on Information Technology - New Generations, 212-217.
4. Singh, A. K., & Roy, S. (2012, March). A network based vulnerability scanner for detecting SQLI attacks in web applications. In 2012 1st international conference on recent advances in information technology (RAIT) (pp. 585-590). IEEE.
5. Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine