Skip to main content
. 2019 Dec 20;14(12):e0226594. doi: 10.1371/journal.pone.0226594

Fig 6. A network overview of the simulated botnet.

Fig 6