Why would we get attacked? An analysis of attacker's aims behind DDoS attacks.

Abhishta AbhishtaWouter van HeeswijkMarianne JungerLambert J. M. NieuwenhuisReinoud Joosten
Published in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2020)
Keyphrases
  • ddos attacks
  • data analysis
  • personal information