1. B. Ager N. Chatzis A. Feldmann N. Sarrar S. Uhlig and W. Willinger. Anatomy of a Large European IXP. ACM SIGCOMM (2012). 10.1145/2342356.2342393 B. Ager N. Chatzis A. Feldmann N. Sarrar S. Uhlig and W. Willinger. Anatomy of a Large European IXP. ACM SIGCOMM (2012). 10.1145/2342356.2342393
2. Akamai. State of the Internet Security Report (Q3 2016). https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/q3-2016-state-of-the-internet-security-report.pdf. (2016). Akamai. State of the Internet Security Report (Q3 2016). https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/q3-2016-state-of-the-internet-security-report.pdf. (2016).
3. Akamai. State of the Internet Security Report (Q4 2017). https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/q4-2017-state-of-the-internet-security-report.pdf. (2017). Akamai. State of the Internet Security Report (Q4 2017). https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/q4-2017-state-of-the-internet-security-report.pdf. (2017).
4. Akamai. Prolexic Technologies by Akamai. https://www.akamai.com/us/en/cloud-security.jsp. (2018). Akamai. Prolexic Technologies by Akamai. https://www.akamai.com/us/en/cloud-security.jsp. (2018).
5. Akamai. State of the Internet Security Report (Attack Spotlight: Memcached). https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/soti-summer-2018-attack-spotlight.pdf. (2018). Akamai. State of the Internet Security Report (Attack Spotlight: Memcached). https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/soti-summer-2018-attack-spotlight.pdf. (2018).