1. [1] Takahashi, T., Hazeyama, H., Miyamoto, D. and Kadobayashi, Y.: Taxonomical Approach to the Deployment of Traceback Mechanisms, Proc. 2011 BCFIC Riga (2011).
2. [2] Savage, S., Wetherall, D., Karlin, A.R. and Anderson, T.: Practical Network Support for IP Traceback, Proc. ACM SIGCOMM, pp.205-306 (2000).
3. [3] Peng, T., Leckie, C. and Ramamohanarao, K.: Survey of Network-based Defense Mechanisms Countering the DoS and DDoS Problems, ACM Computing Surveys, Vol.39, No.1 (2007).
4. [4] Song, D. and Perrig, A.: Advanced and Authenticated Marking Schemes for IP Traceback, Proc. IEEE INFOCOM, pp.876-886 (2001).
5. [5] Dean, D., Franklin, M. and Stubblefield, A.: An Algebraic Approach to IP Traceback, Proc. Network and Distributed System Security Symp. (NDSS), pp.3-12 (2001).