Y Feng, J Li - Deployable Machine Learning for Security Defense …, 2020 - drive.google.com
By attacking (eg, flooding) the bandwidth or resources of a victim (eg, a web server) on the
Internet from multiple compromised systems (eg, a botnet), distributed Denial-of-Service …