Chonka, A., Xiang, Y., Zhou, W.L. and Bonti, A. (2010) Cloud Security Defense to Protect Cloud Computing against HTTP-DoS and XML-DoS Attacks. Journal of Network and Computer Applications, 34, 1097-1107.
 Park, K. and Lee, H. (2001) On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets. Proceedings of the 2001 SIGCOMM Conference, 31, 15-26. http://dx.doi.org/10.1145/383059.383061
 Sung, M. and Xu, J. (2003) IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDos Attacks. IEEE Transactions on Parallel and Distributed Systems, 14, 861-872. http://dx.doi.org/10.1109/TPDS.2003.1233709
 Mahajan, R., Bellovin, S.M., Floyd, S., Ioannidis, J., Paxson, V. and Shenke, S. (2002) Controlling High Bandwidth Aggregates in the Network. ACM SIGCOMM Computer Communication Review, 32, 62-73.
 Bernstein, D.J. (1997) SYN Cookies. http://cr.yp.to/syncookies.html
 Xu, J. and Lee, W. (2003) Sustaining Availability of Web Services under Distributed Denial of Service Attacks. IEEE Transactions on Computers, 52, 195-208. http://dx.doi.org/10.1109/TC.2003.1176986
 Juel, A. and Brainard, J. (1999) Client Puzzles: A Cryptographic Countermeasure against Connection Depletion Attacks. Proceedings of the Network and Distributed System Security Symposium, NDSS’99, San Diego, February 1999.
 Aura, T., Nikander, P. and Leiwo, J. (2000) Dos-Resistant Authentication with Client Puzzles. Cambridge Security Protocols Workshop 2000. Lecture Notes in Computer Science. Springer, Berlin, 200.
 Chen, S.G., Tang, Y. and Du, W.L. (2007) Stateful DDos Attacks and Targeted Filtering. Journal of Network and Computer Applications, 30, 823-840. http://dx.doi.org/10.1016/j.jnca.2005.07.007
 Vissers, T., Somasundaram, T.S., Pieters, L., Govindarajan, K. and Hellinckx, P. (2014) DDos Defense System for Web Services in a Cloud Environment. Future Generation Computer Systems, 37, 37-45.
 Geva, M., Herzberg, A. and Gev, Y. (2013) Bandwidth Distributed Denial of Service: Attacks and Defenses. IEEE Security & Privacy, 12, 54-61. http://dx.doi.org/10.1109/MSP.2013.55
 Foroushani, V.A. and Zincir-Heywood, A.N. (2013) Deterministic and Authenticated Flow Marking for IP Traceback. IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), Barcelona, 25-28 March 2013, 397-404.
 Sivabalan, S. and Radcliffe, P.J. (2013) A Novel Framework to Detect and Block DDos Attack at the Application Layer. IEEE TENCON Spring Conference, Sydney, 17-19 April 2013, 578-582.
 Sowkarthiga, P. and Suguna, N. (2013) Finding the DDoS Attacks in the Network Using Distance Based Routing. International Conference on Current Trends in Engineering and Technology (ICCTET), ICCTET’13, Coimbatore, 3 July 2013, 410-412.
 Tao, Y. and Yu, S. (2013) DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics. TRUSTCOM’13, Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, 16-18 July 2013, 233-240. http://dx.doi.org/10.1109/TrustCom.2013.32
 Ioannidis, J. and Bellovin, S.M. (2002) Implementing Pushback: Router-Based Defense against DDos Attacks. Proceedings of the Network and Distributed System Security Symposium, San Diego, ISOC, Reston, VA.
 Mahlous, R., Chaourar, B. and Fretwell, R.J. (2008) A Comparative Study Between Max Flow Multipath, Multi Shortest Paths And Single Shortest Path. In: Proceedings of PGNet 2008, PGNet, Liverpool.
 Yaar, A., Perrig, A. and Song, D. (2004) SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. In Proceedings IEEE Symposium on Security and Privacy Symposium, 9-12 May 2004, 130-143.
 Osipov, E., Kassler, A., Bohnert, T.M. and Masip-Bruin, X. (2010) Wired/Wireless Internet Comm-unications. 8th International Conference on Wired/Wireless Internet Communications (WWIC), Luleå, 1-10 June 2010.
 Beitollahi, H. and Deconinck, G. (2011) A Cooperative Mechanism to Defense against Distributed Denial of Service Attacks. IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Changsha, 16-18 November 2011, 11-20.