1. A simulation model for the analysis of ddos amplification attacks;Molina;Modelling and Simulation (UKSim), 2015 17th UKSim-AMSS International Conference on,2015
2. Dos attacks intelligent detection using neural networks;Alfantookh;J. King Saud Univ.-Comput.Inf. Sci.,2006
3. Vulnerability analysis and best practices for adopting ip telephony in critical infrastructure sectors;Cao;Commun. Magaz., IEEE,2006
4. Http over udp: an experimental investigation of quic;Carlucci,2015
5. The energy impact of security mechanisms in modern mobile devices;Caviglione;Netw. Security,2012