. Arbornetworks, Fingerprint sharing alliance (2012), http://www.arbornetworks.com/careers/53- products/4418-fingerprint-sharing-alliance-overview

R. Bless, Using realistic internet topology data for large scale network simulations in omnet++, Tech. rep, 2002.

I. Muttik and C. Barton, Cloud security technologies, Information Security Technical Report, vol.14, issue.1, pp.1-6, 2009.
DOI : 10.1016/j.istr.2009.03.001

E. Nygren, R. K. Sitaraman, and J. Sun, The Akamai network, ACM SIGOPS Operating Systems Review, vol.44, issue.3, pp.2-19, 2010.
DOI : 10.1145/1842733.1842736

L. Qiu, V. N. Padmanabhan, and G. M. Voelker, On the placement of web server replicas, pp.1587-1596, 2001.

A. Rashad, S. Dongwon, and L. Heejo, Dropfast: Defending against ddos attacks using cloud technology, International Conference on Security and Management, 2013.

M. Xie, I. Widjaja, and H. Wang, Enhancing cache robustness for content-centric networking, In: INFOCOM. pp, pp.2426-2434, 2012.