[1]
“Distributed Denial of Service: Attack techniques and mitigation”, ijmrr, vol. 15, no. 2s, pp. 393–398, Apr. 2025, Accessed: Dec. 08, 2025. [Online]. Available: https://ijmrr.com/index.php/ijmrr/article/view/84