1. National Institute of Standards and Technology (NIST). (2012). Computer Security Incident Handling Guide (NIST Special Publication 800-61 Rev. 2). Section 2.3.3, "Denial of Service," p. 2-6. The document defines a DoS attack as "an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU), memory, bandwidth, and disk space."
2. Kurose, J. F., & Ross, K. W. (2017). Computer Networking: A Top-Down Approach (7th ed.). Pearson. Chapter 8.2, "Principles of Secure Networking," discusses Denial-of-Service attacks, describing them as attacks that render a network, host, or other piece of infrastructure unusable by legitimate users by flooding the resource with bogus traffic.
3. Saltzer, J. H., & Kaashoek, M. F. (2009). Principles of Computer System Design: An Introduction. MIT OpenCourseWare. Chapter 11, "Security and Protection," Section 11.6.2, "Denial of Service," p. 438. This text explains that DoS attacks aim to "prevent legitimate users from getting service" by consuming a critical, non-shareable resource.