<div dir="auto">Yea. My bad. Sorry. </div><div class="gmail_extra"><br><div class="gmail_quote">On Jan 26, 2018 12:12 PM, &quot;Kareem Mohamed&quot; &lt;<a href="mailto:kmohame1@stevens.edu">kmohame1@stevens.edu</a>&gt; wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">On Fri, Jan 26, 2018 at 11:19 AM, Divyendra Patil &lt;<a href="mailto:dpatil3@stevens.edu">dpatil3@stevens.edu</a>&gt; wrote:<br>
&gt; Others I&#39;ve come across in research are:<br>
&gt;<br>
&gt; ...<br>
&gt;<br>
&gt; Feel free to correct!<br>
<br>
This list seems heavily inspired by this blog post<br>
<a href="https://ethicalhacking424.wordpress.com/2015/12/04/dos-attacks-and-techniques/" rel="noreferrer" target="_blank">https://ethicalhacking424.<wbr>wordpress.com/2015/12/04/dos-<wbr>attacks-and-techniques/</a>.<br>
Let&#39;s remember to give credit where credit is due.<br>
<br>
-KM<br>
______________________________<wbr>_________________<br>
cs615asa mailing list<br>
<a href="mailto:cs615asa@lists.stevens.edu">cs615asa@lists.stevens.edu</a><br>
<a href="https://lists.stevens.edu/mailman/listinfo/cs615asa" rel="noreferrer" target="_blank">https://lists.stevens.edu/<wbr>mailman/listinfo/cs615asa</a><br>
</blockquote></div></div>