• Jiang L, Xu C, Wang X and Zhou Y. Analysis and Comparison of the Network Security Protocol with DoS/DDoS Attack Resistance Performance. Proceedings of the 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conf on Embedded Software and Systems. (1785-1790).

    https://doi.org/10.1109/HPCC-CSS-ICESS.2015.148

  • Cristea M and Groza B. Provable Synthetic Coordinates for Increasing PoWs Effectiveness against DoS and Spam. Proceedings of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust. (809-810).

    https://doi.org/10.1109/SocialCom-PASSAT.2012.96

  • B. S. J and Janakiram D. (2010). SyMon: A practical approach to defend large structured P2P systems against Sybil Attack. Peer-to-Peer Networking and Applications. 10.1007/s12083-010-0084-0. 4:3. (289-308). Online publication date: 1-Sep-2011.

    http://link.springer.com/10.1007/s12083-010-0084-0

  • Boyd C, Gonzalez-Nieto J, Kuppusamy L, Narasimhan H, Rangan C, Rangasamy J, Smith J, Stebila D and Varadarajan V. (2011). Cryptographic Approaches to Denial-of-Service Resistance. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. 10.1007/978-81-322-0277-6_6. (183-238).

    https://link.springer.com/10.1007/978-81-322-0277-6_6

  • Jyothi B and Dharanipragada J. (2009). SyMon: Defending large structured P2P systems against Sybil attack 2009 IEEE Ninth International Conference on Peer-to-Peer Computing (P2P). 10.1109/P2P.2009.5284520. 978-1-4244-5066-4. (21-30).

    http://ieeexplore.ieee.org/document/5284520/