V. Inc, Verisign Distributed Denial of Service Trends Report, issue 1 ? 1st quarter 2014

S. Kumar, Smurf-based Distributed Denial of Service (DDoS) Attack Amplification in Internet, Second International Conference on Internet Monitoring and Protection (ICIMP 2007), pp.25-25, 2007.
DOI : 10.1109/ICIMP.2007.42

S. M. Specht and R. B. Lee, Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures, pp.543-550, 2004.

F. Schreier, On Cyberwarfare, DCAF Horizon, Working Paper Series, issue.7, 2012.

G. Fenza, D. Furno, V. Loia, and M. Veniero, Agent-based Cognitive approach to Airport Security Situation Awareness, 2010 International Conference on Complex, Intelligent and Software Intensive Systems, pp.1057-1062, 2010.
DOI : 10.1109/CISIS.2010.105

D. Furno, V. Loia, M. Veniero, M. Anisetti, V. Bellandi et al., Towards an agent-based architecture for managing uncertainty in situation awareness, 2011 IEEE Symposium on Intelligent Agent (IA), pp.1-6, 2011.
DOI : 10.1109/IA.2011.5953605

D. Maio, C. Fenza, G. Furno, D. Loia, and V. , Swarm-based semantic fuzzy reasoning for situation awareness computing, IEEE International Conference on, pp.1-7, 2012.

M. Vidulich, C. Dominguez, E. Vogel, and G. Mcmillan, Situation awareness: papers and annotated bibliography -Armstrong Laboratory, Human System Center, ref. AL/CF-TR-1994-0085, 1994.

C. Colombini and A. Colella, Digital Profiling: A Computer Forensics Approach, Lecture Notes in Computer Science, vol.6908, pp.330-343, 2011.
DOI : 10.1007/978-3-642-23300-5_26

A. Colella and C. M. Colombini, Cyber-space, Cyberware, Cyber-weapons, IISFA MEMBERBOOK 2012 DIGITAL FORENSICS. Experta Edizioni, 2012.

C. Colombini, A. Colella, M. Mattiucci, and A. Castiglione, Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel, Multidisciplinary Research and Practice for Information Systems. Volume 7465 of Lecture Notes in Computer Science, pp.416-429, 2012.
DOI : 10.1007/978-3-642-32498-7_31

C. Colombini and A. Colella, Digital scene of crime: technique of profiling users, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.50-73, 2012.

F. Palmieri and U. Fiore, Network anomaly detection through nonlinear analysis, Computers & Security, vol.29, issue.7, pp.737-755, 2010.
DOI : 10.1016/j.cose.2010.05.002

F. Palmieri, U. Fiore, and A. Castiglione, A distributed approach to network anomaly detection based on independent component analysis, Concurrency and Computation: Practice and Experience, vol.11, issue.1, pp.1113-1129, 2014.
DOI : 10.1002/cpe.3061

U. Fiore, F. Palmieri, A. Castiglione, and A. De-santis, Network anomaly detection with the restricted Boltzmann machine, Neurocomputing, vol.122, issue.0, pp.13-23, 2013.
DOI : 10.1016/j.neucom.2012.11.050

C. Colombini, A. Colella, M. Mattiucci, and A. Castiglione, Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace, Security Engineering and Intelligence Informatics of Lecture Notes in Computer Science, pp.236-252, 2013.
DOI : 10.1007/978-3-642-40588-4_17

URL : https://hal.archives-ouvertes.fr/hal-01506705

A. Colella and C. M. Colombini, La rete e le informazioni, raccolta e uso illecito dei dati, IISFA MEMBERBOOK 2011 DIGITAL FORENSICS. Experta Edizioni, pp.201-220, 2012.