1. Wavelet analysis of long-range dependent traffic;Abry;IEEE Trans. Inf. Theory,1998
2. DoS attacks intelligent detection using neural networks;Alfantookh;Proc. J. King Saud Univ.-Comput. Sci. Inform. Sci.,2006
3. On Estimating end-to-end network path properties;Allman,1999
4. Ansari, N., Shevtekar, A., 2011. On the New Breed of Denial of Service (DOS) Attacks in the Internet. In: Cyber Infrastructure Protection, pp. 279–305.
5. Bartlett, G., Rey, M.D., Heidemann, J., Papadopoulos, C., 2009. Using Low-Rate Flow Periodicities for Anomaly Detection, Extended Technical Report ISI-TR-661.