2Christos DouligerJs, Aikaterini Mitrokotsa. DDoS Attacks and Defense Mechaisms: Classification and Stare--of-the--Art. Computer Networks, 2004, 44:643-666.
3Rocky K. C. Chang. Defending against Flooding--Based Distributed Denial--of--Service Attacks: A Tutorial. IEEE Communications Magazine, October 2002, IEEE Volume 40 Issue 10.42 51.
4Andrey Belenky and Nirwan Ansari. On IP Traceback. IEEE Communications Magazine, July 2003, Vol.41 No.7 : 142--153.
5Burbeck K. Current gesearch and Use of Anomaly Detection. Enabling Technologies: Infrastructure for Collaborative Enterprise, 2005. 14th IEEE International Workshops on, Link?ping University, Sweden, June 3-15 2005 : 138.