1Blessy, R., and Deepa, A. J. 2015. "A Survey on Network Security Attacks and Prevention Mechanism." Journal of Current Computer Science and Technology 5 (2): 1-5.
2Zargar, S. T., Joshi, J., and Tipper, D. 2013. "A Survey of Defense Mechanisms against Distributed Denial of Service (DDoS) Flooding Attacks." IEEE Communications Surveys & Tutorials 15 (4): 2046-69.
3Prasad, K. M., Reddy, A. R. M., and Rao, K. V. 2014. "DOS and DDoS Attacks: Defense, Detection and Traceback Mechanisms--A Survey." Global Journal of Computer Science and Technology 14 (7): 15-32.
4Gupta, B. B., Joshi, R. C., and Misra, M. 2010. "Distributed Denial of Service Prevention Techniques." International Journal of Computer and Electrical Engineering 2 (2): 268-76.
5Ankita, P., and Khatiwala, F. 2015. "Survey on DDoS Attack Detection and Prevention in Cloud." International Journal of Engineering Technology, Management and Applied Sciences 3 (2): 43-7.
6Krylov, V., and Kravtsov, K. 2014. "IP Fast Hopping Protocol Design." In Proceedings of the lOth Central and Eastern European Software Engineering Conference in Russia, Moscow.
7Krylov, V., and Kravtsov, K. 2014. "DDoS Attack and Interception Resistance IP Fast Hopping Based Protocol." Presented at the 23rd International Conference on Software Engineering and Data Engineering, SEDE 2014, New Orleans.
8Mittal, P., Kim, D., Hu, Y. C., and Caesar, M. 2012. "Mirage: Towards Deployable DDoS Defense for Web Applications." arXiv.
9Antonatos, S., Akritidis, P., Markatos, E. P., and Anagnostakis, K. G. 2005. "Defending against Hittist Worms Using Network Address Space Randomization." In Proceedings of the 2005 ACM Workshop on Rapid Malcode, Fairfax, VA, USA.
10Lake, D., Rayes, A., and Morrow, M. 2012. "The Internet of Things." The lnternet Protocol Journal 15 (3): 10-9.