Skip to main content
. 2019 Dec 20;14(12):e0226594. doi: 10.1371/journal.pone.0226594

Fig 7. A network overview of the pre-constructed P2P botnet deployed on cloud platforms.

Fig 7