In der ersten Jahreshälfte 2013 ereignete sich die bisher grösste DDoS-Attacke in der Geschichte des Internets.
-- http://www.news.admin.ch/NSBSubscriber/message/attachments/32481.pdf/
R. Baker, and I. Martinovic. Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, page 35--46. New York, NY, USA, ACM, (2016)
S. Brands, and D. Chaum. Advances in Cryptology, volume 765 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, EUROCRYPT edition, (1994)
S. Capkun, J. Hubaux, and L. Buttyán. Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking &Amp; Computing, page 46--56. New York, NY, USA, ACM, (2003)
J. Luo, H. Shukla, and J. Hubaux. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM), page 1-12. IEEE, (April 2006)
A. Juels, and J. Brainard. Proceedings of the Network and Distributed System Security Symposium, San Diego, California, USA, The Internet Society, (1999)
M. Pennacchiotti, and A. Popescu. Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, page 430--438. New York, NY, USA, ACM, (2011)
T. Sakaki, M. Okazaki, and Y. Matsuo. Proceedings of the 19th international conference on World wide web, page 851--860. New York, NY, USA, ACM, (2010)
A. Fragkiadakis, V. Siris, and N. Petroulakis. Wired/Wireless Internet Communications, volume 6074 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2010)
W. Xu, W. Trappe, Y. Zhang, and T. Wood. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, page 46--57. New York, NY, USA, ACM, (2005)
M. Strasser, C. Pöpper, and S. Capkun. Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, page 207--218. New York, NY, USA, ACM, (2009)
C. Pöpper, M. Strasser, and S. Capkun. Proceedings of the 18th conference on USENIX security symposium, page 231--248. Berkeley, CA, USA, USENIX Association, (2009)
J. Bellardo, and S. Savage. Proceedings of the 12th conference on USENIX Security Symposium, volume 12 of SSYM'03, Berkeley, CA, USA, USENIX Association, (2003)
Y. Ponomarchuk, and D. Seo. Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications (ICUT '09), page 1-6. (2009)
D. Liu, J. Raymer, and A. Fox. 9th International Conference on Mobile Adhoc and Sensor Systems (MASS), page 335-343. IEEE Computer Society, (December 2012)
M. Cakiroglu, and A. Özcerit. Proceedings of the 3rd international conference on Scalable information systems, page 4:1--4:8. ICST, Brussels, Belgium, Belgium, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), (2008)
M. Schäfer, V. Lenders, and I. Martinovic. Applied Cryptography and Network Security, volume 7954 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)