[1] Alaba FA, Othman M, Hashem IA, Alotaibi F. Internet of Things security: A survey. Journal of Network and Computer Applications. 2017 Jun 15;88:10-28.
[2] Conoscenti M, Vetro A, De Martin JC. Blockchain for the Internet of Things: A systematic literature review. In2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA) 2016 Nov 29 (pp. 1-6). IEEE.
[3] Gazis V, Görtz M, Huber M, Leonardi A, Mathioudakis K, Wiesmaier A, Zeiger F, Vasilomanolakis E. A survey of technologies for the internet of things. In2015 international wireless communications and mobile computing conference (IWCMC) 2015 Aug 24 (pp. 1090-1095). IEEE.
[4] Alamri M, Jhanjhi NZ, Humayun M. Blockchain for Internet of Things (IoT) research issues challenges & future directions: A review. Int. J. Comput. Sci. Netw. Secur. 2019 May;19(1):244-58.
[5] Yu S. Distributed denial of service attack and defense. Springer New York; 2014 Jan 1.
[6] Kaur P, Kumar M, Bhandari A. A review of detection approaches for distributed denial of service attacks. Systems Science & Control Engineering. 2017 Jan 1;5(1):301-20.
[7] Shah Z, Ullah I, Li H, Levula A, Khurshid K. Blockchain based solutions to mitigate distributed denial of service (DDoS) attacks in the Internet of Things (IoT): A survey. Sensors. 2022 Jan 31;22(3):1094.
[8] Arachchige KG, Branch P, But J. An Analysis of Blockchain-Based IoT Sensor Network Distributed Denial of Service Attacks. Sensors. 2024 May 12;24(10):3083.
[9] Wani S, Imthiyas M, Almohamedh H, Alhamed KM, Almotairi S, Gulzar Y. Distributed denial of service (DDoS) mitigation using blockchain—A comprehensive insight. Symmetry. 2021 Jan 29;13(2):227.
[10] Kumar R, Kumar P, Tripathi R, Gupta GP, Garg S, Hassan MM. A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network. Journal of Parallel and Distributed Computing. 2022 Jun 1;164:55-68.
[11] Singh R, Tanwar S, Sharma TP. Utilization of blockchain for mitigating the distributed denial of service attacks. Security and Privacy. 2020 May;3(3):e96.
[12] Djuitcheu H, Debes M, Aumüller M, Seitz J. Recent review of distributed denial of service attacks in the internet of things. In2022 5th Conference on Cloud and Internet of Things (CIoT) 2022 Mar 28 (pp. 32-39). IEEE.
[13] Aldhyani TH, Alkahtani H. Cyber security for detecting distributed denial of service attacks in agriculture 4.0: Deep learning model. Mathematics. 2023 Jan 3;11(1):233.
[14] Ali MH, Jaber MM, Abd SK, Rehman A, Awan MJ, Damaševičius R, Bahaj SA. Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT). Electronics. 2022 Feb 8;11(3):494.
[15] Djenna A, Harous S, Saidouni DE. Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure. Applied Sciences. 2021 May 17;11(10):4580.
[16] Kaur H, Behal S, Kumar K. Characterization and comparison of distributed denial of service attack tools. In2015 International Conference on Green Computing and Internet of Things (ICGCIoT) 2015 Oct 8 (pp. 1139-1145). IEEE.
[17] Manavi MT. Defense mechanisms against distributed denial of service attacks: A survey. Computers & Electrical Engineering. 2018 Nov 1;72:26-38.
[18] Dalmazo BL, Marques JA, Costa LR, Bonfim MS, Carvalho RN, da Silva AS, Fernandes S, Bordim JL, Alchieri E, Schaeffer‐Filho A, Paschoal Gaspary L. A systematic review on distributed denial of service attack defense mechanisms in programmable networks. International Journal of Network Management. 2021 Nov;31(6):e2163.
[19] Cheema A, Tariq M, Hafiz A, Khan MM, Ahmad F, Anwar M. Prevention techniques against distributed denial of service attacks in heterogeneous networks: A systematic review. Security and Communication Networks. 2022 May 20;2022:1-5.
[20] Varma SA, Reddy KG. A review of DDoS attacks and its countermeasures in cloud computing. In2021 5th International Conference on Information Systems and Computer Networks (ISCON) 2021 Oct 22 (pp. 1-6). IEEE.
[21] Kumar R, Lal SP, Sharma A. Detecting denial of service attacks in the cloud. In2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech) 2016 Aug 8 (pp. 309-316). IEEE.
[22] Kolhe TD, Kolhe MT. Distributed Denial Of Service Attack Techniques: Analysis, Implementation And Comparison.
[23] Karthikeyani R, Karthikeyan E. A Review on Distributed Denial of Service Attack. Asian Journal of Research in Computer Science. 2023 Oct 13;16(4):133-44.
[24] Adedeji KB, Abu-Mahfouz AM, Kurien AM. DDoS attack and detection methods in internet-enabled networks: Concept, research perspectives, and challenges. Journal of Sensor and Actuator Networks. 2023 Jul 6;12(4):51.
[25] Salim MM, Rathore S, Park JH. Distributed denial of service attacks and its defenses in IoT: a survey. The Journal of Supercomputing. 2020 Jul;76:5320-63.
[26] Suthar F, Patel N. A Survey on DDoS Detection and Prevention Mechanism. Journal of Advances in Information Technology. 2023;14(3).
[27] Wong F, Tan CX. A survey of trends in massive DDoS attacks and cloud-based mitigations. International Journal of Network Security & Its Applications. 2014 May 1;6(3):57.