1. Ip traceback using header compression;Aljifri;Computers & Security,2003
2. Tracking the role of adversaries in measuring unwanted traffic;Allman,2006
3. A multi-sensor model to improve automated attack detection;Almgren,2008
4. S. Andersson, A. Clark, G. Mohay, Detecting network-based obfuscated code injection attacks using sandboxing, in: AusCERT Asia Pacific Information Technology Security Conference (Gold Coast, Australia), 2005.
5. Counting bloom filters for pattern matching and anti-evasion at the wire speed;Antichi;IEEE Network,2009