[1. https://www.cloudflare.com/under-attack (accessed on 1 December 2014)]Search in Google Scholar
[2. http://www.thedailybeast.com/articles/2010/12/11/hackers-10-most-famous-attacks-wormsand-ddos-takedowns.html (accessed on 1 December 2014)]Search in Google Scholar
[3. Abdul-Rahman, A., S. Hailes. Using Recommendations for Managing Trust in Distributed Systems. - In: Proc. of IEEE Malaysia International Conference on Communication (MICC’97), 1997.]Search in Google Scholar
[4. Liu, B., Z. Yua. Incorporating Social Networks and User Opinions for Collaborative Recommendation: Local Trust Network Based Method. - In: Proc. of the Workshop on Context-Aware Movie Recommendation, ACM, 2010, pp. 53-56.]Search in Google Scholar
[5. Zacharia, G. Trust Management Through Reputation Mechanisms, Workshop in Deception, Fraud and Trust in Agent Societies. - In: Third International Conference on Autonomous Agents (Agents’99), ACM, 1999.]Search in Google Scholar
[6. Eschenauer, L., V. D. Gligor, J. Bara. On Trust Establishment in Mobile Ad Hoc Networks. - Security Protocols Springer, 2004, pp. 47-66.10.1007/978-3-540-39871-4_6]Search in Google Scholar
[7. Iyengar, N. C. Sriman Narayana, Gopinath Ganapathy, P. C. Mogan Kumar, Ajith Abraham. A Multilevel Thrust Filtration Defending Mechanism Against Ddos Attacks in Cloud Computing Environment. - International Journal of Grid and Utility Computing, Vol. 5, 2014, No 4, pp. 236-248.10.1504/IJGUC.2014.065384]Search in Google Scholar
[8. Jeyanthi, N., N. C. S. N. Iyengar. Packet Resonance Strategy: A Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment. - International Journal of Communication Networks and Information Security, Vol. 4, 2012, No 3, pp. 163-173.10.17762/ijcnis.v4i3.238]Search in Google Scholar
[9. http://www.opnet.com/news/press_releases/pr-2010/OPNET-Introduces-Cloud-Readiness-Service-pr.html (accessed on 1 December 2014)]Search in Google Scholar
[10. Jeyanthi, N., N. C. S. N. Iyengar, P. C. Mogan Kumar, A. Kannamma l. An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment. - International Journal of Communication Networks and Information Security, Vol. 5, 2013, No 2, pp. 110-119.10.17762/ijcnis.v5i2.367]Search in Google Scholar
[11. http://www.opnet.com./services/brochures/OPNET_CloudReadiness.pdf (accessed on 1 December 2014)]Search in Google Scholar
[12. Jeyanthi, N., C. Iyengar. Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment. - Cybernetics and Information Technologies, Vol. 13, 2013, No 1, pp. 46-60. 10.2478/cait-2013-0005]Search in Google Scholar