Research Article

Impact of Defending Strategy Decision on DDoS Attack

Figure 5

Stability of the attacked solution E1.