{"labels":{"en":"A model of a DDoS attack scenario on elements of specialized information technology and methods of combating cybercriminals"},"descriptions":{"en":"scientific paper published in CEUR-WS Volume 3675"},"claims":{"P31":"Q13442814","P1433":"Q126456742","P1476":{"text":"A model of a DDoS attack scenario on elements of specialized information technology and methods of combating cybercriminals","language":"en"},"P407":"Q1860","P953":"https://ceur-ws.org/Vol-3675/paper19.pdf","P50":[{"value":"Q4664732","qualifiers":{"P1545":"4"}}],"P2093":[{"value":"Mykola Stetsyuk","qualifiers":{"P1545":"1"}},{"value":"Viktor Cheshun","qualifiers":{"P1545":"2"}},{"value":"Yuriy Stetsyuk","qualifiers":{"P1545":"3"}},{"value":"leksandr Kozelskiy","qualifiers":{"P1545":"5"}}]}}