%PDF-1.4
%
1 0 obj <>stream
application/pdfIEEE2013 IEEE Security and Privacy Workshops;2013; ; ;10.1109/SPW.2013.12Network forensicsIDSMalwareInfectionsUnderstanding Network Forensics Analysis in an Operational EnvironmentElias RaftopoulosXenofontas Dimitropoulos
2013 IEEE Security and Privacy Workshops111 May 201310.1109/SPW.2013.12118
endstream
endobj
2 0 obj <>stream
application/pdf2013 IEEE Security and Privacy Workshops;2013; ; ;10.1109/SPW.2013.12Understanding Network Forensics Analysis in an Operational Environment
iTextSharp 4.0.7 (based on iText 2.0.7); modified using iText® 7.1.1 ©2000-2018 iText Group NV (AGPL-version)
2013-05-05T19:04:57.000Z2018-12-02T06:11:33.000Z
endstream
endobj
3 0 obj <>stream
xS**T0P A# 27P01PHUЏȴPpWr
r
!i\`
@
!\!Y\!\\ ī
endstream
endobj
4 0 obj <>stream
x+ |
endstream
endobj
5 0 obj<>
endobj
6 0 obj <>stream
x켉E?^U}Lϑ3sOOd&3d&dB$
ʕp$T$*/p% `@]-*"xDYUHTavz?~0BH:9jZ^P%O"T`Β?_ݎ.G