T. Ross and j. Wiley, “Fuzzy Logic with Engineering Application,” The Atrium, Southern Gate, Chichester, West Sussex, vol. United Kingdom, 2005.
C. Hsue, “Evaluating the Best Main Battle Tank Using Fuzzy Decision Theory with Linguistic Criteria Evaluation,” European Journal Of Operational Research, vol. 142, 2002.
X. Peng Su and H. Tang, “DoS Attack Impact Assessment based on 3GPP QoS Indexes,” Institute of Electronic Technology, The PLA Information Engineering University, P. R. China, 2008.
P. Mirkovic, S. Fahmy, R. Thomas, A. Hussain, and S. Schwab, “Measuring Impact of denial Of service,” 2nd ACM workshop on Quality of protection QoP, pp. 53 - 58, 2006.
S. Kumar, M. Sachdeva, and K. Kumar, “Flooding based DDoS attacks and their influence on web services,” International Journal of Computer Science and InformationTechnology, vol. 2, no. 3, pp. 1131-1136, 2011.
K. Kumar, “Protection from Distributed Denial of Service (DDoS) Attacks in ISP Domain,” Indian Institute of Technology, Roorkee, 2007.
J. Mirkovic, B. Wilson, S. Fahmy, P. Reiher, R Thomas, W. Yao, and S. Schwab, “Towards user-centric metrics for denial-of-service measurement,” In proceedings of the workshop on Experimental computer science, San Diego, California, 2007.
S. Schwab, R. Thomas, and B. Wilson, “Towards systematic IDS evaluation,” In Proceedings of DETER Community Workshop, pp. 20-23, June 2006.
C. Joshi, “An Integrated Honeypot Framework for Proactive Detection, Characterization and Redirection of DDoS Attacks at ISP level,” International Journal of Information Assurance and Security (JIAS), vol. 3, no. 1,
pp. 1-15, March 2008.
B. Gupta and M. Misra, “An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach,” Journal of Information Assurance and Security, vol. 3, no. 2, pp. 102-110, June 2008.
W. T. Dubendorfer and B. Plattner, “An economic damage model for large-scale Internet attacks,” In 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, vol. IEEE Comput. Soc., pp. 223-228, 2004.
D. Merwe, “MIDAS: An Impact Scale for DDoS attacks,” 15th IEEE Workshop on Local & Metropolitan Area Networks, pp. 200–205, 2007.
V. Raja, S. Reddy Gade, and S. Kumar, “Performance of Win-dows XP, Windows Vista and Apple’s Leopard Computers under a Denial of Service Attack,” In Fourth International Conference on Digital Society, pp. 188-191, IEEE, February 2010, 2010.
F. Roman Chertov and B. Shroff, “Emulation versus Simula-tion: A Case Study TCP-Targeted Denial of Service Attacks,” 2nd International Conference on Testbeds and Research Infrastructures for the Development of Net-works and Communities, pp. 316–325, 2006.
I. Traore, “Queue-based analysis of DoS attacks,” In Information Assurance Workshop, IAW’05, pp. 266-273 2005.
S. Floyd and V. Jacobson, “Random early detection gateways for congestion avoid-ance,” IEEE/ACM Transactions on Networking, vol. 1, no. 4, pp. 397-413, 1993.
H. Alefiya Hussain and C. Papadopoulos, “A framework for classi-fying denial of service attacks,” In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications-SIGCOMM New York, USA ACM Press, p. 99, 2003.
H. Jelena Mirkovic, S. Fahmy, P. Reiher, and R. Thomas,
“Accurately Measuring Denial of Service in Simulation and Testbed Experiments,” IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 2, pp. 81-95, April 2009.
G. Monika Sachdeva and K. Kumar, “An emulation based impact analysis of DDoS attacks on web services during flash events,” 2nd International Conference on Computer and Communication Technology (ICCCT-2011), pp. 479-484, 2011.
K. Monika Sachdeva, G. Singh, and K. Singh, “Performance Analysis of Web Service under DDoS Attacks,” IEEE International Advance Computing Conference, number March, pp. 1002-1007, 2009.
H. Builder and C. Nordin, “Alternative Models of Command and Control,” In: Command Concepts: A Theory Derived from the Practice of Command and Control, Rand Corp., 1999.
K. Monika Sachdeva, G. Singh, and K. Singh, “Performance Analysis of Web Service under DDoS Attacks,” IEEE International Advance Computing Conference (IACC 2009), March 2009.
C. Rither, “Predicting the Impact of Denial of Service Attacks,” Department of Electrical and Computer Engineering, THESIS: Degree of Master of Science, Air University, Ohio, 2012.
G. Monika Sachdeva, K. Kumar1, and K. Singh, “Measuring Impact of DDOS Attacks on Web Services,” Information Assurance and Security, 2010.
H. Teodor Sommestad and M. Ekstedt, “Estimates of success rates of Denial-of-Service attacks,” Royal Institute of Technology (KTH), 2011.