I. Kotuliak, P. Rybár, and P. Trúchly, Performance Comparison of IPsec and TLS Based VPN Technologies Stará Lesná, The High Tatras, Slovakia, ICETA 2011 : 9th IEEE International Conference on Emerging eLearning Technologies and Applications, pp.217-221, 2011.

L. Fan, Summary cache: a scalable wide-area Web cache sharing protocol, IEEE/ACM Transactions on Networking, vol.8, issue.3, pp.281-293, 2000.
DOI : 10.1109/90.851975

V. Kambhampati, A taxonomy of capabilities based DDoS defense architectures, 2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), pp.157-164, 2011.
DOI : 10.1109/AICCSA.2011.6126615

R. Robinson, R. R. Thomas, and C. , Evaluation of mitigation methods for distributed denial of service attacks, 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp.713-718, 2012.
DOI : 10.1109/ICIEA.2012.6360818

A. Habib and D. Roy, Steps to defend against DoS attacks, 2009 12th International Conference on Computers and Information Technology, pp.614-619, 2009.
DOI : 10.1109/ICCIT.2009.5407310

I. Rfc, Sep.) Transmission control protocol, 1981.

F. S. Tabataba and M. R. Hashemi, Improving false positive in Bloom filter, 19th Iranian Conference on, p.1, 2011.

M. Nagy and I. Kotuliak, Enhancing security in mobile data networks through end user and core network cooperation, Proceedings of International Conference on Advances in Mobile Computing & Multimedia, MoMM '13, pp.978-979
DOI : 10.1145/2536853.2536875

D. Yeung and W. Chen, Throttling spoofed syn flooding traffic at the source, Telecommunication Systems, vol.33, issue.3, pp.47-65, 2006.

S. Cardinal, Use offense to inform defense. Find flaws before the bad guys do. SANS Institute Last Updated: 31, 2000.

E. Acri, Complemento Howto, 2011.

E. Syn, Flood with Random Spoofed Source Address, p.31, 2014.

J. Brouer, Mitigate TCP SYN Flood Attacks with Red Hat Enterprise Linux 7 Beta Posted on 11, 2014.

P. Davis, Securing and controling CISCO routers, 2002.
DOI : 10.1201/9781420031454