A. Konovalov, I. Kotenko, and A. Shorov, Simulation-based study of botnets and defense mechanisms against them, Journal of Computer and Systems Sciences International, vol.52, issue.1, pp.43-65, 2013.
DOI : 10.1134/S1064230712060044

I. Kotenko, A. Konovalov, and A. Shorov, Agent-based Modeling and Simulation of Botnets and Botnet Defense, Conference on Cyber Conflict. Proceedings, 2010.

J. Wang, R. Phan, J. Whitley, and D. Parish, Advanced DDoS Attacks Traffic Simulation with a Test Center Platform, International Journal for Information Security Research, vol.2, issue.3, 2011.
DOI : 10.20533/ijisr.2042.4639.2012.0021

B. Butler, Interop network squares off against controlled 70G bit/sec DDoS attack, http://www.networkworld.com/article/2166091/data-center/interop-network-squares-off- against-controlled-70g-bit-sec-ddos-attack, 2013.

A. Årnes, P. Haas, G. Vigna, and R. A. Kemmerer, Using a virtual security testbed for digital forensic reconstruction, pp.144-163, 2006.

I. Kotenko and E. Doynikova, Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), pp.14-29, 2014.

A. Fedorchenko, I. Kotenko, and A. Chechulin, Integrated repository of security information for network security evaluation, Journal of Wireless Mobile Networks, Ubiquitous Computing , and Dependable Applications TCP SYN Flooding and IP Spoofing Attacks. CA-1996-21, pp.41-57, 2015.