Academic literature on the topic 'Flooding attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Flooding attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Flooding attack"

1

Khalaf, Bashar Ahmad, Salama A. Mostafa, Aida Mustapha, et al. "An Adaptive Protection of Flooding Attacks Model for Complex Network Environments." Security and Communication Networks 2021 (April 22, 2021): 1–17. http://dx.doi.org/10.1155/2021/5542919.

Full text
Abstract:
Currently, online organizational resources and assets are potential targets of several types of attack, the most common being flooding attacks. We consider the Distributed Denial of Service (DDoS) as the most dangerous type of flooding attack that could target those resources. The DDoS attack consumes network available resources such as bandwidth, processing power, and memory, thereby limiting or withholding accessibility to users. The Flash Crowd (FC) is quite similar to the DDoS attack whereby many legitimate users concurrently access a particular service, the number of which results in the
APA, Harvard, Vancouver, ISO, and other styles
2

Hsieh, Chih-Hsiang, Wei-Kuan Wang, Cheng-Xun Wang, Shi-Chun Tsai, and Yi-Bing Lin. "Efficient Detection of Link-Flooding Attacks with Deep Learning." Sustainability 13, no. 22 (2021): 12514. http://dx.doi.org/10.3390/su132212514.

Full text
Abstract:
The DDoS attack is one of the most notorious attacks, and the severe impact of the DDoS attack on GitHub in 2018 raises the importance of designing effective defense methods for detecting this type of attack. Unlike the traditional network architecture that takes too long to cope with DDoS attacks, we focus on link-flooding attacks that do not directly attack the target. An effective defense mechanism is crucial since as long as a link-flooding attack is undetected, it will cause problems over the Internet. With the flexibility of software-defined networking, we design a novel framework and im
APA, Harvard, Vancouver, ISO, and other styles
3

Abu Zant, Mahmoud, and Adwan Yasin. "Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV)." Security and Communication Networks 2019 (March 28, 2019): 1–12. http://dx.doi.org/10.1155/2019/8249108.

Full text
Abstract:
Security in MANET is an essential task in preventing the harm that could be caused by malicious nodes in the network. Flooding attack is one of DoS attacks that aim to exhaust the network resources by flooding the network with a lot of fake packets and messages. There are different forms of Flooding attacks, and the most common form is the request one. Request Flooding attack keeps flooding the network with a lot of requests to the fake nodes that do not exist in the network. In this research, we presented a new enhanced AODV protocol AIF AODV that can detect and isolate flooding nodes in the
APA, Harvard, Vancouver, ISO, and other styles
4

Ramanauskaitė, Simona, and Antanas Čenys. "STOCHASTIC MODEL OF TCP SYN ATTACKS / STOCHASTINIS TCP SYN ATAKŲ MODELIS." Mokslas - Lietuvos ateitis 3, no. 1 (2011): 20–24. http://dx.doi.org/10.3846/mla.2011.004.

Full text
Abstract:
A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS) attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the ef
APA, Harvard, Vancouver, ISO, and other styles
5

Cheng, Hai Xiu, and Bi Zeng. "A Method Based on BP Neural Network to Detect SIP DOS Flooding Attack." Applied Mechanics and Materials 263-266 (December 2012): 2773–78. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2773.

Full text
Abstract:
In order to detect the SIP flooding attacks in IMS (IP Multimedia Subsystem) network, the paper proposes a flooding attack detection method based on BP neural network, and analyses causes of SIP flooding attack, and thus determine the BP the input of the neural network characteristics. The simulation results show that this method has better detection performance.
APA, Harvard, Vancouver, ISO, and other styles
6

Baldev Singh, Dr, Dr S.N. Panda, and Dr Gurpinder Singh Samra. "Slow flooding attack detection in cloud using change point detection approach." International Journal of Engineering & Technology 7, no. 2.30 (2018): 33. http://dx.doi.org/10.14419/ijet.v7i2.30.13459.

Full text
Abstract:
Cloud computing is one of the high-demand services and prone to numerous types of attacks due to its Internet based backbone. Flooding based attack is one such type of attack over the cloud that exhausts the numerous resources and services of an individual or an enterprise by way of sending useless huge traffic. The nature of this traffic may be of slow or fast type. Flooding attacks are caused by way of sending massive volume of packets of TCP, UDP, ICMP traffic and HTTP Posts. The legitimate volume of traffic is suppressed and lost in traffic flooding traffics. Early detection of such attack
APA, Harvard, Vancouver, ISO, and other styles
7

Luong, Ngoc T., Tu T. Vo, and Doan Hoang. "FAPRP: A Machine Learning Approach to Flooding Attacks Prevention Routing Protocol in Mobile Ad Hoc Networks." Wireless Communications and Mobile Computing 2019 (January 10, 2019): 1–17. http://dx.doi.org/10.1155/2019/6869307.

Full text
Abstract:
Request route flooding attack is one of the main challenges in the security of Mobile Ad Hoc Networks (MANETs) as it is easy to initiate and difficult to prevent. A malicious node can launch an attack simply by sending an excessively high number of route request (RREQ) packets or useless data packets to nonexistent destinations. As a result, the network is rendered useless as all its resources are used up to serve this storm of RREQ packets and hence unable to perform its normal routing duty. Most existing research efforts on detecting such a flooding attack use the number of RREQs originated
APA, Harvard, Vancouver, ISO, and other styles
8

Saragih, Naikson, Ridho Agus Wery Nanda Panjaitan, and Mufria Jonatan Purba. "FORENSIC NETWORK ANALYSIS AND IMPLEMENTATION OF SECURITY ATTACKS ON VIRTUAL PRIVATE SERVERS." Jurnal Sistem Informasi dan Ilmu Komputer Prima(JUSIKOM PRIMA) 6, no. 2 (2023): 28–34. http://dx.doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.2932.

Full text
Abstract:
ABSTRACT-PT Kodinglab Integrasi Indonesia's Virtual Private Server (VPS) product requires good quality standards, including security. The challenge that arises is still frequent disruptions to the protection of PT Kodinglab's VPS customers, where it is difficult to identify the source of the attack. Network forensics in the form of dead forensics and live forensics using the NIST method with the stages of collection, examination, Analysis, and reporting are used to find the source of the attack. Data for dead forensics comes from snort tools, and data for live forensics comes from capture Wire
APA, Harvard, Vancouver, ISO, and other styles
9

L, Sheeba, and Meenakshi V S. "“HYBRID NODE WATCHING TECHNIQUE BASED DOS FLOODING ATTACK DETECTION IN WIRELESS SENSOR NETWORK." ICTACT Journal on Communication Technology 11, no. 4 (2020): 2292–300. https://doi.org/10.21917/ijct.2020.0339.

Full text
Abstract:
Intrusion detection is the most concentrated research issue in the wireless sensor network where presence of intrusion activities are most difficult to find where there is no centralized architecture to monitor. One of the most frequently found intrusion activities in wireless sensor network are Denial of Service (DoS) Flooding attacks. DoS flood attacks would send large volume of chunk messages to the end node in order to corrupt the functioning of the particular node. Some of the most important DoS flooding attacks that are found in the network are ICMP flood attack, Synchronous Flood attack
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Se-Yul, and Yong-Soo Kim. "Design and Analysis of Probe Detection Systems for TCP Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (2004): 369–72. http://dx.doi.org/10.20965/jaciii.2004.p0369.

Full text
Abstract:
Advanced computer network technology enables the connectivity of computers in an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and cannot detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We propose a n
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Flooding attack"

1

Margotta, Fabrizio. "DoS and DDoS attacks in Named Data Networking." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/21855/.

Full text
Abstract:
La nascita di Internet ha portato benefici senza precedenti in termini sociali ed economici. Le tecnologie e i protocolli inizialmente adottati andavano a risolvere i problemi causati dall’inaffidabilità della preesistente linea telefonica e nel corso dei vari decenni hanno garantito il funzionamento delle comunicazioni globali. Tuttavia ci si pone delle domande sulla necessità di un nuovo cambio di paradigma che risponda alle nuove esigenze riscontrate nell’evoluzione di Internet stesso e dei servizi offerti. Named Data Networking, come progetto della famiglia delle Future Internet Architec
APA, Harvard, Vancouver, ISO, and other styles
2

Dudek, Jindřich. "Detekce síťových útoků pomocí nástroje Tshark." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385934.

Full text
Abstract:
This diploma thesis deals with the design and implementation of a tool for network attack detection from a captured network communication. It utilises the tshark packet analyser, the meaning of which is to convert the input file with the captured communications to the PDML format. The objective of this conversion being, increasing the flexibility of input data processing. When designing the tool, emphasis has been placed on the ability to expand it to detect new network attacks and on integrating these additions with ease. For this reason, the thesis also includes the design of a complex decla
APA, Harvard, Vancouver, ISO, and other styles
3

You, Yonghua. "A defense framework for flooding-based DDoS attacks." Thesis, Kingston, Ont. : [s.n.], 2007. http://hdl.handle.net/1974/653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Makke, Ali. "Détection d'attaques dans un système WBAN de surveillance médicale à distance." Thesis, Paris 5, 2014. http://www.theses.fr/2014PA05S006/document.

Full text
Abstract:
L'un des défis majeurs du monde de ces dernières décennies a été l'augmentation continue de la population des personnes âgées dans les pays développés. D’où la nécessité de fournir des soins de qualité à une population en croissance rapide, tout en réduisant les coûts des soins de santé. Dans ce contexte, de nombreux travaux de recherche portent sur l’utilisation des réseaux de capteurs sans fil dans les systèmes WBAN (Wireless Body Area Network), pour faciliter et améliorer la qualité du soin et de surveillance médicale à distance. Ces réseaux WBAN soulèvent de nouveaux défis technologiques e
APA, Harvard, Vancouver, ISO, and other styles
5

Kang, Min Suk. "Handling Large-Scale Link-Flooding Attacks in the Internet." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/833.

Full text
Abstract:
Link-flooding attacks in which an adversary coordinates botnet messages to exhaust the bandwidth of selected network links in the core of the Internet (e.g., Tier-1 or Tier-2 networks) have been a powerful means of denial of service. In the past few years, these attacks have moved from the realm of academic curiosities to real-world incidents. Unfortunately, we have had a limited understanding of this type of attacks and effective countermeasures in the current Internet. In this dissertation, we address this gap in our understanding of link-flooding attacks and propose a two-tier defense appro
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Soo Bum. "Localizing the effects of link flooding attacks in the internet." College Park, Md. : University of Maryland, 2009. http://hdl.handle.net/1903/10052.

Full text
Abstract:
Thesis (Ph.D.) -- University of Maryland, College Park, 2009.<br>Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
7

Akbar, Yousef M. A. H. "Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98554.

Full text
Abstract:
The power grid has changed a great deal from what has been generally viewed as a traditional power grid. The modernization of the power grid has seen an increase in the integration and incorporation of computing and communication elements, creating an interdependence of both physical and cyber assets of the power grid. The fast-increasing connectivity has transformed the grid from what used to be primarily a physical system into a Cyber- Physical System (CPS). The physical elements within a power grid are well understood by power engineers; however, the newly deployed cyber aspects are new to
APA, Harvard, Vancouver, ISO, and other styles
8

Signorello, Salvatore. "A multifold approach to address the security issues of stateful forwarding mechanisms in Information-Centric Networks." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0109/document.

Full text
Abstract:
Ce travail illustre comment les tendances actuelles d'utilisation dominantes sur Internet motivent la recherche sur des architectures futures de réseau plus orientées vers le contenu. Parmi les architectures émergentes pour l'Internet du futur, le paradigme du Information-Centric Networking (ICN) est présenté. ICN vise à redéfinir les protocoles de base d'Internet afin d'y introduire un changement sémantique des hôtes vers les contenus. Parmi les architectures ICN, le Named-Data Networking (NDN) prévoit que les demandes nommées de contenus des utilisateurs soient transmises par leur nom dans l
APA, Harvard, Vancouver, ISO, and other styles
9

Bediako, Peter Ken. "Long Short-Term Memory Recurrent Neural Network for detecting DDoS flooding attacks within TensorFlow Implementation framework." Thesis, Luleå tekniska universitet, Datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-66802.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks is one of the most widespread security attacks to internet service providers. It is the most easily launched attack, but very difficult and expensive to detect and mitigate. In view of the devastating effect of DDoS attacks, there has been the increase on the adaptation of a network detection technique to reveal the presence of DDoS attack before huge traffic buildup to prevent service availability. Several works done on DDoS attack detection reveals that, the conventional DDoS attack detection methods based on statistical divergence is useful, howe
APA, Harvard, Vancouver, ISO, and other styles
10

Makke, Ali. "Détection d'attaques dans un système WBAN de surveillance médicale à distance." Electronic Thesis or Diss., Paris 5, 2014. http://www.theses.fr/2014PA05S006.

Full text
Abstract:
L'un des défis majeurs du monde de ces dernières décennies a été l'augmentation continue de la population des personnes âgées dans les pays développés. D’où la nécessité de fournir des soins de qualité à une population en croissance rapide, tout en réduisant les coûts des soins de santé. Dans ce contexte, de nombreux travaux de recherche portent sur l’utilisation des réseaux de capteurs sans fil dans les systèmes WBAN (Wireless Body Area Network), pour faciliter et améliorer la qualité du soin et de surveillance médicale à distance. Ces réseaux WBAN soulèvent de nouveaux défis technologiques e
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Flooding attack"

1

Tang, Jin, and Yu Cheng. "SIP Flooding Attack Detection." In Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8996-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nalayini, C. M., and Jeevaa Katiravan. "Block Link Flooding Algorithm for TCP SYN Flooding Attack." In International Conference on Computer Networks and Communication Technologies. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8681-6_83.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shin, Seung-won, Ki-young Kim, and Jong-soo Jang. "LSAD: Lightweight SYN Flooding Attack Detector." In Distributed Computing and Internet Technology. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30555-2_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sebastian, Bosco, Paromita Choudhury, and C. D. Jaidhar. "Mechanism for Preventing Registration Flooding Attack in SIP." In Intelligent Computing, Networking, and Informatics. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1665-0_71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Boro, Debojit, Himant Basumatary, Tribeni Goswami, and Dhruba K. Bhattacharyya. "UDP Flooding Attack Detection Using Information Metric Measure." In Advances in Intelligent Systems and Computing. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0129-1_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Choi, Yang-seo, Ik-Kyun Kim, Jin-Tae Oh, and Jong-Soo Jang. "AIGG Threshold Based HTTP GET Flooding Attack Detection." In Information Security Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35416-8_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xie, Lixia, Ying Ding, and Hongyu Yang. "Mitigating Link-Flooding Attack with Segment Rerouting in SDN." In Cyberspace Safety and Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Veigner, Christian, and Chunming Rong. "Flooding Attack on the Binding Cache in Mobile IPv6." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-75993-5_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wadhwani, Priyanka, and Sourabh Singh Verma. "Analysing Performance Disruption of MANET Under Explicit Flooding Attack Frequency." In Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30927-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Xinyu, Beumjin Cho, and Jong Kim. "SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN." In Information Security Applications. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56549-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Flooding attack"

1

Jupriyadi, Ridha Muldina Negara, Eueung Mulyana, and Nana Rachmana Syambas. "The Impact of Collusive Interest Flooding Attack on NDN Network Performance." In 2024 10th International Conference on Wireless and Telematics (ICWT). IEEE, 2024. http://dx.doi.org/10.1109/icwt62080.2024.10674740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mounika, V., N. Raghavendra Sai, Vasantha Bhavani, and P. S. V. S. Sridhar. "Expression of Concern for: Interest Flooding Attack Detection Method in NDN Networks." In 2021 2nd International Conference on Smart Electronics and Communication (ICOSEC). IEEE, 2021. http://dx.doi.org/10.1109/icosec51865.2021.10702908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Kun-Chih Jimmy, and Li-Heng Billy Ke. "Two-level Verification-Based Defense Mechanism for Flooding Attack on NoC Systems." In 2024 17th IEEE/ACM International Workshop on Network on Chip Architectures (NoCArc). IEEE, 2024. http://dx.doi.org/10.1109/nocarc64615.2024.10749951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Yue, Runcheng Fang, Qipeng Song, and Xilei Yang. "STGCN-Based Link Flooding Attack Detection and Mitigation in Software-Defined Network." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

M, Kiruthika, Lalitha Krishnasamy, Prithi Samuel, and Kaavya Kanagaraj. "FADA: Flooding Attack Defense AODV Protocol to counter Flooding Attack in MANET." In 2023 IEEE Fifth International Conference on Advances in Electronics, Computers and Communications (ICAECC). IEEE, 2023. http://dx.doi.org/10.1109/icaecc59324.2023.10560115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Defense Against TCP Flooding Attack." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2012. http://dx.doi.org/10.5220/0004119604160420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sana, Akourmis, Fakhri Youssef, and Rahmani Moulay Driss. "FLOODING ATTACK ON AODV IN WSN." In 2018 Renewable Energies, Power Systems & Green Inclusive Economy (REPS-GIE). IEEE, 2018. http://dx.doi.org/10.1109/repsgie.2018.8488836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Geetha, K., and N. Sreenath. "SYN flooding attack — Identification and analysis." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033828.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Purwanto, Yudha, Kuspriyanto, Hendrawan, and Budi Rahardjo. "Traffic anomaly detection in DDos flooding attack." In 2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA). IEEE, 2014. http://dx.doi.org/10.1109/tssa.2014.7065953.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nagrath, Preeti, Sandhya Aneja, and G. N. Purohit. "Defending flooding attack in Delay Tolerant Networks." In 2015 International Conference on Information Networking (ICOIN). IEEE, 2015. http://dx.doi.org/10.1109/icoin.2015.7057854.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Flooding attack"

1

Eddy, W. TCP SYN Flooding Attacks and Common Mitigations. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Soo B., and Virgil D. Gligor. FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada580050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lee, Soo B., and Virgil D. Gligor. FLoc: Dependable Link Access for Legitimate Traffic in Flooding Attacks. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada582042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ramanujan, Ranga S., Doug Harper, Maher Kaddoura, David Baca, John Wu, and Kevin Millikin. Organic Techniques for Protecting Virtual Private Network (VPN) Services from Access Link Flooding Attacks. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada436292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!