Books
  1. Internet Denial of Service: Attack and Defense Mechanisms, by Jelena Mirkovic, Sven Dietrich, David Dittrich and Peter Reiher, Prentice Hall PTR, ISBN 0-13-147573-8
Journals
  1. J. Mirkovic and P. Reiher, D-WARD: A Source-End Defense Against Flooding Denial-of-Service Attacks, IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 3, July-September 2005, pp. 216-232
  2. J. Mirkovic and P. Reiher, A Taxonomy of DDoS Attacks and Defense Mechanisms, ACM SIGCOMM Computer Communications Review, Volume 34, Number 2, April 2004, pp. 39-54.
  3. V. Milutinovic, D. Cvetkovic and J. Mirkovic, Genetic Search Based on Multiple Mutations, IEEE Computer, pp. 118-119, November 2000.
Conferences
  1. M. Natu and J. Mirkovic, Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations, Proceedings of the Large-Scale Attack and Defense Workshop, August 2007
  2. J. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, P. Reiher, R. Thomas, W. Yao, and S. Schwab, Towards User-Centric Metrics for Denial-Of-Service Measurement, Proceedings of the Workshop on Experimental Computer Science, June 2007
  3. J. Mirkovic, S. Wei, A. Hussain, B. Wilson, R. Thomas, S. Schwab, S. Fahmy, R. Chertov and P. Reiher DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed, Proceedings of the Tridentcom 2007, May 2007.
  4. J. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, W. Yao, P. Reiher, S. Schwab and R. Thomas When Is Service Really Denied? A User-Centric DoS Metric, Proceedings of the Sigmetrics 2007, June 2007
  5. J. Mirkovic, E. Arikan, S. Wei, S. Fahmy, R. Thomas, and P. Reiher Benchmarks for DDoS Defense Evaluation, Proceedings of the Milcom 2006, October 2006
  6. J. Mirkovic, P. Reiher, S. Fahmy, R. Thomas, A. Hussain, S. Schwab and C. Ko Measuring Denial-of-Service, Proceedings of the 2006 Quality of Protection Workshop, October 2006
  7. G. Oikonomou, J. Mirkovic, P. Reiher and M. Robinson, A Framework for Collaborative DDoS Defense, Proceedings of ACSAC 2006, December 2006
  8. S. Wei and J. Mirkovic, Building Reputations for Internet Clients, Proceedings of the STM 2006, September 2006
  9. S. Wei and J. Mirkovic, A Realistic Simulation of Internet-Scale Events, Proceedings of the 2006 VALUETOOLS Conference, October 2006
  10. S. Wei, J. Mirkovic and E. Kissel, Profiling and Clustering Internet Hosts, Proceedings of the 2006 International Conference on Data Mining, June 2006
  11. S. Wei, J. Mirkovic, and M. Swany Distributed Worm Simulation with a Realistic Internet Model, Proceedings of the 2005 Symposium on Modelling and Simulation of Malware, June 2005
  12. J. Mirkovic, M. Robinson, P. Reiher, and G. Kuenning, Alliance Formation for DDoS Defense, Proceedings of the New Security Paradigms Workshop, ACM SIGSAC, August 2003.
  13. J. Mirkovic, G. Prier and P. Reiher, Challenges of Source-End DDoS Defense, Proceedings of 2nd IEEE International Symposium on Network Computing and Applications, April 2003.
  14. J. Mirkovic, G. Prier and P. Reiher, Attacking DDoS at the Source, Proceedings of 10th IEEE International Conference on Network Protocols, November 2002.
  15. M. Burns, G. Prier, J. Mirkovic, P. Reiher, Implementing Address Assurance in the Intel IXP Router, Proceedings of Network Processors Conference, October 2002.
  16. J. Li, J. Mirkovic, M. Wang, P. Reiher and L. Zhang, SAVE: Source Address Validity Enforcement Protocol, Proceedings of INFOCOM, June 2002.
  17. J. Mirkovic, G. P. Venkataramani, S. Lu, and L. Zhang, A Self-Organizing Approach to Data Forwarding In Large-Scale Sensor Networks, Proceedings of International Conference on Communications, June 2001.
Technical Reports
  1. J. Mirkovic, N. Jevtic and P. Reiher, A Practical IP Spoofing Defense Through Route-Based Filtering, University of Delaware CIS Department Technical Report CIS-TR-2006-332.
  2. J. Mirkovic, M. Robinson, P. Reiher and G. Oikonomou, Distributed Defense Against DDOS Attacks, University of Delaware CIS Department Technical Report CIS-TR-2005-02.
  3. J. Mirkovic, J. Martin and P. Reiher, A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms, UCLA CSD Technical Report CSD-TR-020018.
  4. J. Mirkovic, G. Prier and P. Reiher, Source Router Approach to DDoS Defense, UCLA CSD Technical Report CSD-TR-010042.
  5. J. Mirkovic, Z. Xu, J. Li, M. Schnaider, P. Reiher and L. Zhang, iSAVE: Incrementally Deployable Source Address Validation, UCLA CSD Technical Report CSD-TR-020030.
  6. J. Li, J. Mirkovic, M. Wang, P. Reiher and L. Zhang, SAVE: Source Address Validity Enforcement Protocol, UCLA Technical Report CSD-TR-010004.
Other
  1. J. Mirkovic, D-WARD: Source-End Defense Against Distributed Denial-of-Service Attacks, Ph.D. Thesis, UCLA, August 2003