On Fri, Jan 26, 2018 at 11:19 AM, Divyendra Patil <dpatil3 at stevens.edu> wrote: > Others I've come across in research are: > > ... > > Feel free to correct! This list seems heavily inspired by this blog post https://ethicalhacking424.wordpress.com/2015/12/04/dos-attacks-and-techniques/. Let's remember to give credit where credit is due. -KM