![Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library](https://onlinelibrary.wiley.com/cms/asset/7ad98cd8-b13d-43fc-9da6-86e83999189f/nem2008-gra-0013.png)
Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library
![Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library](https://onlinelibrary.wiley.com/cms/asset/6c25f1de-ea47-4ce6-a9fd-16e56db64acf/nem2008-fig-0002-m.jpg)
Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library
![Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library](https://onlinelibrary.wiley.com/cms/asset/48572a06-56a7-4fd9-84a3-b06a1ad43353/nem2008-fig-0005-m.jpg)
Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library
Proceedings of the 12th Conference on International Conference on Network and Service Management: Booter Blacklist Generation: U
![Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library](https://onlinelibrary.wiley.com/cms/asset/e675875d-51a1-4ede-b5cc-e59cbcbc346d/nem2008-fig-0001-m.jpg)
Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library
![Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library Booter list generation: The basis for investigating DDoS‐for‐hire websites - Santanna - 2018 - International Journal of Network Management - Wiley Online Library](https://onlinelibrary.wiley.com/cms/asset/c980b2be-94a2-4bb0-956b-1f27460fbad7/nem2008-fig-0006-m.jpg)