[1]
H. T. Sihotang, W. . Alrasyid, A. . Delano, H. . Jacob, and G. P. . Rizky, “Vulnerability Analysis and Mitigation Strategies of DDoS Attacks on Cloud Infrastructure”, JBST, vol. 14, no. 2, pp. 53-60, Jun. 2025.