Security and Communication Networks / 2018 / Article / Fig 2

Review Article

DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

Figure 2

Architecture models examples.
(a) Agent-Handler model
(b) Reflector model
(c) IRC-based model
(d) P2P-based model

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.