1. Petar Cisar, “A Flow based algorithm for Statistical Anomaly Detection”, In Proceedings of the 7th International Symposium of Hungarian Researches on Computational Intelligence.
2. T. Ditcheva and Lisa Fowler, “Signature-based Intrusion Detection” class notes for COMP290-040, University of North Carolina at Chapel Hill, Feb. 2005.
3. Stephen M. Specht, Ruby B. Lee “Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures”, In Proceedings of the International Conferences on Parallel and Distributed system, pp. 543-550, September 2004.
4. B. Song, J Heo, and C. S. Hong, “Collaborative Defense Mechanism Using Statistical Detection Method against DDoS attacks”, IEICE TRANS. COMMUN E90-B, 2007, pp. 2655-2644.
5. J. Wang, X. Yang, and K. Long, “A new relative entropy based app-DDoS detection method”, In Proceedings of the IEEE symposium on Computers and Communications, pp. 966-968, Riccione, Italy 2010.