1. S. Axelsson, Research in intrusion detection systems: A survey, Tech. Rep. TR 98-17, Chalmers University of Technology, 1999.
2. Set covering algorithms using cutting planes, heuristics, and subgradient optimization;Balas;Mathematical Programming Study,1980
3. Computer Emergency Response Team (CERT), Advisory CA-2000-01 Denial-of-service developments, 2000. Available from: .
4. CERT/CC, SANS Institute, and CERIAS, Consensus roadmap for defeating distributed denial of service attacks, 2000. Available from: .
5. Perfect, ideal and balanced matrices;Conforti;European Journal of Operational Research,2001