1. Defending against flooding-based distributed denial-of-service attack: A tutorial;Chang;IEEE Communication Magazine,2002
2. F.Y. Leu, J.C. Lin, M.C. Li, C.T. Yang, A performance-based grid intrusion detection system, in: The IEEE Annual International Computer Software and Applications Conference, July 2005, pp. 525–530
3. J. Haggerty, Q. Shi, M. Merabti, Beyond the Perimeter: The need for early detection of denial of service attacks, in: The IEEE Annual Computer Security Applications Conference, Dec. 2002, pp. 413–422
4. Y. Du, H.Q. Wang, Y.G. Pang, Design of a distributed intrusion detection system based on independent agents, in: The IEEE International Conference on Intelligent Sensing and Information, 2004, pp. 254–257
5. R.C. Oliveira, J. Pereira, A. Schiper, Primary-backup replication: From a time-free protocol to a time- based implementation, in: The IEEE Symposium on Reliable Distributed Systems, Oct. 2001, pp. 14–23