1. 2001. Strategies to Reduce False Positives and False Negatives in NIDS. https://www.symantec.com/connect/articles/strategies-reduce-false-positives-and-false-negatives-nids. (2001). 2001. Strategies to Reduce False Positives and False Negatives in NIDS. https://www.symantec.com/connect/articles/strategies-reduce-false-positives-and-false-negatives-nids. (2001).
2. 2012. Sockstress Tools & Source Code. https://defuse.ca/sockstress.htm. (2012). 2012. Sockstress Tools & Source Code. https://defuse.ca/sockstress.htm. (2012).
3. 2015. The Expanding Role of Service Providers in DDoS Mitigation. https://resources.arbornetworks.com/i/481939-the-expanding-role-of-service-providers-in-ddos-mitigation?hubItemID=55526068. (2015). {Online; accessed 23-Jan-2017}. 2015. The Expanding Role of Service Providers in DDoS Mitigation. https://resources.arbornetworks.com/i/481939-the-expanding-role-of-service-providers-in-ddos-mitigation?hubItemID=55526068. (2015). {Online; accessed 23-Jan-2017}.
4. 2016. The Biggest Data Breaches in 2016 So Far. https://www.identityforce.com/blog/2016-data-breaches. (2016). {Online; accessed 10-Jan-2017}. 2016. The Biggest Data Breaches in 2016 So Far. https://www.identityforce.com/blog/2016-data-breaches. (2016). {Online; accessed 10-Jan-2017}.
5. 2016. How the Dyn DDoS attack unfolded. http://www.networkworld.com/article/3134057/security/how-the-dyn-ddos-attack-unfolded.html. (2016). 2016. How the Dyn DDoS attack unfolded. http://www.networkworld.com/article/3134057/security/how-the-dyn-ddos-attack-unfolded.html. (2016).