1. CSI/FBI Computer Crime and Security Survey. , 2006, online.
2. A. Kuzmanovic, E. Knightly, Low-rate TCP-targeted denial of service attacks (The Shrew vs. the Mice and Elephants), in: ACM SIGCOMM 2003, 2003, pp. 75–86.
3. M. Guirguis, A. Bestavros, I. Matta, Exploiting the transients of adaptation for RoQ attacks on Internet resources, in: IEEE ICNP 2004, 2004, pp. 184–195.
4. S. Ebrahimi-Taghizadeh, A. Helmy, S. Gupta, TCP vs. TCP: a systematic study of adverse impact of short-lived TCP flows on long-lived TCP flows, in: IEEE INFOCOM 2005, 2005, pp. 926–937.
5. X. Luo, R.K.C. Chang, On a new class of pulsing denial-of-service attacks and the defense, in: NDSS 2005, 2005.