![Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library](https://onlinelibrary.wiley.com/cms/asset/48572a06-56a7-4fd9-84a3-b06a1ad43353/nem2008-fig-0005-m.jpg)
Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library
![Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library](https://onlinelibrary.wiley.com/cms/asset/e675875d-51a1-4ede-b5cc-e59cbcbc346d/nem2008-fig-0001-m.jpg)
Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library
![Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library](https://onlinelibrary.wiley.com/cms/asset/d8513389-5ec9-41b1-a318-7327c68fc199/nem.v28.1.cover.jpg)