1. Use of IP addresses for high rate flooding attack detection;Ahmed,2010
2. 1998 world cup web site access logs;Arlitt,1998
3. Current developments in DETER cybersecurity testbed technology;Benzel,2009
4. Modelling web-server flash events;Bhatia,2012
5. Analyzing interaction between distributed denial of service attacks and mitigation technologies;Blackert,2003