Z. Chen and C. Ji, "Measuring network-aware worm spreading ability ,2007 View Artical
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S.Schenker, "Controlling high bandwidth aggregates in the network", ACM Computer Communications Review ,Vol.32 ,2002 View Artical
K. Argyraki and D. Cheriton, "Scalable network-layer defense against internet bandwidth-flooding attacks", IEEE/ACM Transactions on Networking ,Vol.17 ,2009 View Artical
X. Liu, X. Yang, and Y. Lu, "To filter or to authorize: Network-layer DoS defense against multimillion-node botnets ,2008 View Artical
A. Caprara, H. Kellerer, U. Pferschy, and D. Pisinger, "Approximation algorithms for knapsack problems with cardinality constraints", European Journal of Operational Research ,Vol.123 ,2000 View Artical
V. Li and G. Curry, "Solving multidimensional knapsack problems with generalized upper bound constraints using critical e", Computers & Operations Research ,Vol.32 ,2005 View Artical
F. Soldo, A. Markopoulou, and K. Argyraki, "Optimal filtering of source address prefixes: Models and algorithms", Proc. of IEEE INFOCOM, Rio de Janeiro, Brazil ,2009 View Artical