G. Zipf, “Human behaviour and the principle of least effort: an introduction to human ecology,” Linguistic Society of America, vol. 26, no. 3, pp. 394-401, 1949.
A. I. Saichev, Y. Malevergne, and D. sornette, “Theory of Zipf's Law and Beyond,” Springer-Verlag Berlin Heidelberg, 2010.
S. Huang, D. Yen, L. Yang, and S. Hua, “An investigation of Zipf’s Law for fraud detection,” Decision Support Systems, vol. 46, no. 1, pp. 70-83, 2008.
M. Jauhari, A. Saxena, and J. Gautom, “Zipf’s Law and Number of hits on the World Wide Web,” Annals of Library and Information Studies, vol. 54, no. 2, pp. 81-84, 2007.
L. Adamic and B. Huberman, “Zipf’s Law and the Internet,” Glottometrics 3, pp. 143-150, 2002.
B. R. Chang and H. F. Tsai, “Improving network traffic analysis by foreseeing datapacket- flow with hybrid fuzzy-based model prediction,” Expert Systems with Applications, vol. 36, no. 3, pp. 6960-6965, 2009.
J. Sommers and P. Barford, “Self-Configuring Network Traffic Generation,” in Proceedings of ACM Internet Measurement Conference, Italy, pp. 68-81, 2004.
S. Guadagno, D. Emma, A. Pescap and N. Federico, “D-ITG Distributed Internet Traffic Generator,” in Proceedings, First International Conference on the Quantitative Evaluation of Systems, Netherlands, pp. 316-317, 2004.
“tcpreplay-Tcpreplay,” [Online].Available: http://tcpreplay.synfin.net/wiki/tcpreplay, 2015.
“Network, devices & services testing - Spirent,” [Online]. Available: http://www.spirent.com/. [Accessed 24- 07-2015].
W. M. Shbair, A. R. Bashandy, and S. I. Shaheen, “A New Security Mechanism to Perform Traffic,” in International Conference on Computational Science and Engineering, pp. 405-411, 2009.
F. Sally and P. Vern, “Difficulties in simulating the internet,” IEEE/ACM Trans. Netw., vol. 9, no. 4, pp. 392-403, 2001.
V. Paxson, “Strategies for sound internet measurement,” in Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pp. 264-271, 2004.
V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: a survey,” ACM Computing Surveys, vol. 41, no. 3, pp. 1-58, 2009.
S. Luo and G. A. Marin, “Generating Realistic Network Traffic for Security Experiments,” in Proceedings of the IEEE Southeast Conf., North Carolina, USA, pp. 200-207, 2004.
E. Garsva, N. Paulauskas, G. Grazulevicius, and L. Gulbinovic, “Packet Inter-arrival Time Distribution in Academic Computer Network,” Elektronika IR Elektrotechnika, vol. 20, no. 3, pp. 87-90, 2014.
M. Fras, J. Mohorko, and Z. Cucej, “Packet Size Process Modeling of Measured Self-similar Network Traffic with Defragmentation Method,” in Proceedings of the 15th International Conference on Systems, Signals and Image Processing, Bratislava, pp. 253-256, 2008.
W. E. Leland, M. S. Taqqu, W. Willinger, and D. V. Wilson, “the Self-Similar Nature of Ethernet Traffic (extended version),” IEEE/ACM Transactions on Networking, vol. 2, no. 1, pp. 1-15, 1994.
M. A. Arfeen, K. Pawlikowski, D. McNickle, and A. Willig, “The Role of the Weibull Distribution in Internet Traffic Modeling,” in 25th International Conference Teletraffic Congress (ITC), Shanghai, pp. 1-8, 2013.
L. R. Dominguez, D. O. Roman, D. M. Rodriguez, and C. V. Rosales, “Jitter in IP Networks: A Cauchy Approach,” IEEE Communications Letters, vol. 14, no. 2, pp. 190-192, 2010.
T. K. Bandhopadhya, M. Saxena, and A. Tiwari, “Jitter’s Alpha Stable Distribution Behavior,” Computer Technology and Electronics Engineering (IJCTEE), vol. 3, no. 1, pp. 13-16, 2013.
“MAWI Working Group Traffic Archive,” [Online]. Available: http://mawi.wide.ad.jp/mawi/. [Accessed 24-07- 2015].