I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
pu
t
er
E
ng
ineering
(
I
J
E
CE
)
Vo
l.
15
,
No
.
3
,
J
u
n
e
20
25
,
p
p
.
3162
~
3
1
7
0
I
SS
N:
2088
-
8
7
0
8
,
DOI
: 1
0
.
1
1
5
9
1
/ijece.
v
15
i
3
.
pp
3
1
6
2
-
3
1
7
0
3162
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ec
e.
ia
esco
r
e.
co
m
An
int
eg
ra
ted
framewo
rk f
o
r
data
brea
ch on t
he dar
k web
in brand
mo
ni
toring
data
hunti
ng
Siti
Arpa
h Ahm
a
d
1
,
M
u
ha
m
m
a
d Al’
I
m
ra
n M
o
hd
K
ha
irudd
i
n
2
,
No
r
Sh
a
hn
iza
K
a
m
a
l Ba
s
ha
h
1
,
Nurul Ai
s
ha
h Ab
Ra
m
a
n
3
1
S
c
h
o
o
l
o
f
C
o
m
p
u
t
i
n
g
S
c
i
e
n
c
e
s,
C
o
l
l
e
g
e
o
f
C
o
mp
u
t
i
n
g
,
I
n
f
o
r
ma
t
i
c
s
a
n
d
M
a
t
h
e
ma
t
i
c
s,
U
n
i
v
e
r
s
i
t
i
T
e
k
n
o
l
o
g
i
M
A
R
A
,
S
h
a
h
A
l
a
m
,
M
a
l
a
y
si
a
2
44
th
F
l
o
o
r
,
K
u
a
l
a
L
u
mp
u
r
M
a
i
n
B
r
a
n
c
h
,
M
a
y
b
a
n
k
To
w
e
r
,
1
0
0
,
K
u
a
l
a
L
u
m
p
u
r
,
M
a
l
a
y
si
a
3
F
a
c
u
l
t
y
o
f
C
o
mm
u
n
i
c
a
t
i
o
n
a
n
d
M
e
d
i
a
S
t
u
d
i
e
s
,
U
n
i
v
e
r
si
t
i
Te
k
n
o
l
o
g
i
M
A
R
A
,
S
h
a
h
A
l
a
m
,
M
a
l
a
y
si
a
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Ma
y
3
1
,
2
0
2
4
R
ev
is
ed
J
an
1
0
,
2
0
2
5
Acc
ep
ted
Ma
r
3
,
2
0
2
5
In
t
o
d
a
y
'
s
d
i
g
it
a
l
lan
d
sc
a
p
e
,
d
a
ta
b
re
a
c
h
e
s
p
o
se
a
su
b
sta
n
ti
a
l
th
re
a
t
,
wit
h
t
h
e
d
a
rk
we
b
se
rv
i
n
g
a
s
a
p
re
v
a
len
t
p
latfo
rm
f
o
r
m
a
lev
o
len
t
a
c
to
rs
t
o
p
e
rp
e
trate
su
c
h
in
c
i
d
e
n
ts.
C
u
rre
n
tl
y
,
se
c
u
ri
ty
a
n
a
ly
sts
u
se
v
a
rio
u
s
to
o
ls
to
so
lv
e
th
e
p
ro
b
lem
,
wh
ic
h
is
v
e
r
y
t
ime
-
c
o
n
su
m
i
n
g
.
T
h
is
p
a
p
e
r
in
tr
o
d
u
c
e
s
a
n
o
v
e
l
fra
m
e
wo
rk
th
a
t
i
n
teg
ra
tes
d
a
ta
b
re
a
c
h
m
o
n
i
to
ri
n
g
with
i
n
t
h
e
d
a
rk
we
b
,
fo
c
u
sin
g
o
n
b
ra
n
d
m
o
n
it
o
ri
n
g
a
n
d
d
a
ta
h
u
n
ti
n
g
.
T
h
e
fra
m
e
wo
rk
s
tarts
fro
m
th
e
sc
ra
p
in
g
p
ro
c
e
ss
a
n
d
c
o
n
ti
n
u
e
s
wit
h
t
h
e
u
ti
li
z
a
ti
o
n
o
f
th
e
S
p
l
u
n
k
d
a
sh
b
o
a
rd
.
T
h
e
d
a
sh
b
o
a
r
d
p
ro
v
id
e
s
a
n
e
x
h
a
u
sti
v
e
o
v
e
rv
iew
o
f
d
a
t
a
b
re
a
c
h
e
s
re
late
d
to
b
ra
n
d
s
f
o
r
b
o
t
h
m
a
n
u
a
l
i
n
q
u
iri
e
s
a
n
d
r
u
le
-
b
a
se
d
d
e
tec
ti
o
n
m
e
c
h
a
n
ism
s.
Th
e
fra
m
e
wo
rk
c
o
m
p
rise
s
fiv
e
p
h
a
se
s:
d
a
ta
so
u
rc
in
g
,
d
a
ta
c
o
ll
e
c
ti
o
n
,
in
te
g
ra
ti
o
n
,
m
o
n
i
to
r
in
g
,
a
n
d
v
is
u
a
li
z
a
ti
o
n
.
Th
e
v
isu
a
li
z
a
ti
o
n
p
h
a
se
e
n
c
o
m
p
a
ss
e
s
a
lert
g
e
n
e
ra
ti
o
n
,
n
o
ti
fica
ti
o
n
m
e
c
h
a
n
ism
s,
a
n
d
re
p
o
r
ti
n
g
fu
n
c
ti
o
n
a
li
ti
e
s.
M
o
re
o
v
e
r,
th
e
m
o
n
it
o
ri
n
g
p
h
a
se
p
ro
v
id
e
s
re
a
l
-
ti
m
e
su
rv
e
il
lan
c
e
,
a
d
v
a
n
c
e
d
se
a
rc
h
c
a
p
a
b
il
it
ies
,
b
ra
n
d
m
o
n
it
o
ri
n
g
,
a
n
d
t
h
re
a
t
in
telli
g
e
n
c
e
in
te
g
ra
ti
o
n
.
T
h
e
i
n
te
g
ra
ti
o
n
p
h
a
se
in
v
o
l
v
e
s
se
c
u
rit
y
i
n
fo
rm
a
ti
o
n
a
n
d
e
v
e
n
t
m
a
n
a
g
e
m
e
n
t
(S
IE
M
)
sy
ste
m
s
a
n
d
se
c
u
rit
y
o
rc
h
e
stra
ti
o
n
,
a
u
to
m
a
ti
o
n
,
a
n
d
re
sp
o
n
se
(S
OA
R
)
sy
ste
m
s.
T
h
is
p
a
p
e
r'
s
re
su
lt
c
o
n
t
rib
u
tes
to
e
n
h
a
n
c
in
g
th
e
Na
ti
o
n
a
l
In
stit
u
t
e
o
f
S
tan
d
a
rd
s
a
n
d
Tec
h
n
o
lo
g
y
(NIST
)
c
y
b
e
rse
c
u
r
it
y
fra
m
e
wo
rk
,
o
ffe
ri
n
g
a
c
o
m
p
re
h
e
n
siv
e
so
l
u
ti
o
n
t
o
th
e
d
a
ta
b
re
a
c
h
e
s
c
h
a
ll
e
n
g
e
wit
h
in
th
e
d
a
rk
we
b
a
n
d
t
h
e
fro
n
ti
e
rs
o
f
k
n
o
w
led
g
e
a
n
d
se
c
u
rit
y
p
ra
c
ti
c
e
s.
K
ey
w
o
r
d
s
:
Dar
k
web
Data
b
r
ea
ch
Data
s
af
ety
Per
s
o
n
al
id
en
tifia
b
le
in
f
o
r
m
atio
n
Sen
s
itiv
e
d
ata
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Sit
i A
r
p
ah
Ah
m
ad
Sch
o
o
l o
f
C
o
m
p
u
tin
g
Scien
ce
s
,
C
o
lleg
e
o
f
C
o
m
p
u
tin
g
,
I
n
f
o
r
m
atics a
n
d
Ma
th
em
atics,
Un
i
v
er
s
iti T
ek
n
o
lo
g
i
MA
R
A
4
0
4
5
0
Sh
ah
Alam
,
Selan
g
o
r
,
Ma
lay
s
ia
E
m
ail:
ar
p
ah
3
4
0
@
u
itm
.
ed
u
.
m
y
1.
I
NT
RO
D
UCT
I
O
N
I
n
th
e
co
n
tex
t
o
f
th
e
r
a
p
id
ly
e
v
o
lv
in
g
d
ig
ital
e
n
v
ir
o
n
m
en
ts
,
th
e
p
o
te
n
tial
o
cc
u
r
r
en
ce
o
f
d
at
a
b
r
ea
ch
es
[
1
]
–
[
3
]
h
as
b
ec
o
m
e
in
c
r
ea
s
in
g
ly
co
m
m
o
n
.
T
h
ese
b
r
ea
c
h
es,
wh
ich
en
tail
u
n
au
th
o
r
ized
en
tr
y
in
to
co
n
f
i
d
en
tial
d
ata
[
4
]
,
p
r
esen
t
a
s
ig
n
if
ican
t
p
er
il
to
th
e
in
teg
r
ity
an
d
s
ec
u
r
ity
o
f
i
n
f
o
r
m
atio
n
.
I
n
r
ec
en
t
y
ea
r
s
,
th
e
escalatin
g
d
ep
en
d
e
n
ce
o
n
d
ig
ital
s
y
s
tem
s
an
d
th
e
ad
v
an
cin
g
co
m
p
lex
i
ty
o
f
cy
b
e
r
attac
k
s
h
av
e
led
to
n
o
tab
le
u
n
ea
s
in
ess
s
u
r
r
o
u
n
d
in
g
d
ata
b
r
ea
ch
es.
Sin
ce
2
0
2
0
,
ar
o
u
n
d
1
0
.
8
8
b
illi
o
n
p
er
s
o
n
al
in
f
o
r
m
atio
n
(
f
u
ll
n
am
e,
em
ail
ad
d
r
ess
es,
s
ex
u
al
o
r
ien
tatio
n
,
c
h
at
an
d
e
m
ail
tr
an
s
cr
ip
ts
,
I
P
ad
d
r
ess
an
d
p
ay
m
e
n
t
lo
g
s
)
h
as
b
ee
n
s
to
len
b
y
c
y
b
er
cr
im
i
n
al
[
5
]
.
T
h
ese
b
r
ea
ch
es
ca
n
lead
to
s
ig
n
if
ican
t
co
n
s
eq
u
en
ce
s
f
o
r
b
o
th
p
er
s
o
n
s
an
d
o
r
g
an
izatio
n
s
,
in
clu
d
in
g
f
in
a
n
cial
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
A
n
in
teg
r
a
ted
fr
a
mewo
r
k
fo
r
d
a
ta
b
r
ea
c
h
o
n
th
e
d
a
r
k
w
eb
in
b
r
a
n
d
…
(
S
iti A
r
p
a
h
b
in
ti A
h
ma
d
)
3163
d
is
ad
v
an
tag
e,
h
a
r
m
to
r
e
p
u
tati
o
n
,
leg
al
co
n
s
eq
u
en
ce
s
,
an
d
c
o
m
p
r
o
m
is
ed
p
er
s
o
n
al
p
r
iv
ac
y
[
6
]
.
T
h
e
f
in
d
in
g
s
b
y
Ver
izo
n
d
ata
b
r
ea
c
h
in
v
esti
g
at
io
n
r
ep
o
r
t
[
5
]
o
b
s
er
v
e
th
at
a
s
ig
n
if
ican
t
m
ajo
r
ity
,
p
r
ec
is
ely
7
6
%,
o
f
d
ata
b
r
ea
ch
es
p
er
tain
to
f
in
an
cial
m
atter
s
.
Po
liti
ca
l
m
o
tiv
atio
n
s
ca
n
also
d
r
iv
e
ce
r
tain
b
r
ea
ch
es,
as
s
h
o
wn
wh
e
n
g
o
v
er
n
m
en
t
-
o
wn
ed
p
u
b
lic
d
ata
is
ex
p
o
s
ed
to
ex
p
r
ess
d
is
s
e
n
t
o
r
ad
v
o
ca
te
f
o
r
s
o
cial
ju
s
t
ice.
T
h
e
ex
clu
s
iv
e
d
r
iv
in
g
f
o
r
ce
b
e
h
in
d
o
th
er
b
r
ea
ch
es
is
th
e
p
u
r
s
u
it
o
f
f
i
n
an
cial
b
en
ef
it.
I
n
d
iv
id
u
als
a
d
d
icted
to
s
ee
k
in
g
ex
citem
en
t
m
ay
b
e
t
h
e
cu
l
p
r
its
b
eh
in
d
s
ec
u
r
ity
b
r
ea
ch
es,
as th
ey
ar
e
m
o
tiv
ated
b
y
a
d
esire
to
test
th
e
lim
its
o
f
th
eir
d
am
ag
in
g
h
ac
k
in
g
s
k
ills
.
T
h
e
f
ea
r
s
h
av
e
b
ee
n
f
u
r
th
er
h
eig
h
ten
ed
b
y
th
e
r
is
e
o
f
t
h
e
d
ar
k
web
[
7
]
,
[
8
]
,
a
h
i
d
d
en
I
n
te
r
n
et
s
ec
to
r
th
at
f
ac
ilit
ates
v
ar
io
u
s
cy
b
er
cr
im
in
al
o
p
er
atio
n
s
,
s
u
ch
as
th
e
illeg
al
ex
ch
an
g
e
o
f
co
m
p
r
o
m
is
ed
d
ata.
T
h
e
d
a
r
k
web
r
ef
er
s
to
co
n
ten
t
u
n
in
d
e
x
ed
b
y
o
r
d
in
ar
y
s
ea
r
ch
e
n
g
i
n
es,
n
ec
ess
itatin
g
s
p
ec
ialized
s
o
f
twar
e
o
r
p
r
io
r
au
th
o
r
izatio
n
f
o
r
ac
ce
s
s
[
9
]
.
T
h
e
co
n
ten
t
ac
ce
s
s
ib
le
o
n
th
e
d
ar
k
web
h
o
s
ts
a
s
p
ec
if
ic
s
eg
m
en
t
o
f
th
e
I
n
ter
n
et,
co
m
m
o
n
l
y
ca
lled
th
e
d
ar
k
n
et
[
1
0
]
,
[
1
1
]
.
Acc
ess
to
th
is
s
p
ec
if
ic
p
o
r
tio
n
o
f
t
h
e
I
n
ter
n
et
is
lim
ited
to
ce
r
tain
web
b
r
o
wser
s
o
r
s
p
ec
if
ied
n
etwo
r
k
s
etu
p
s
.
Giv
en
th
is
p
o
ten
tial d
an
g
er
,
th
e
co
n
ce
p
t o
f
b
r
an
d
m
o
n
ito
r
in
g
in
cy
b
er
s
ec
u
r
ity
is
em
er
g
in
g
.
Ho
wev
er
,
p
r
ev
io
u
s
wo
r
k
s
[
1
2
]
–
[
1
4
]
h
av
e
lim
itatio
n
s
o
n
h
o
w
th
e
d
ata
b
r
ea
ch
af
f
ec
ts
co
m
p
a
n
ies'
b
r
an
d
s
with
o
u
t
s
u
g
g
esti
n
g
o
r
in
tr
o
d
u
cin
g
m
eth
o
d
s
to
s
o
lv
e
th
e
p
r
o
b
lem
.
T
h
is
wo
r
k
d
ef
in
es
b
r
an
d
m
o
n
it
o
r
in
g
as
an
e
ar
ly
th
r
ea
t
d
etec
tio
n
to
id
en
tif
y
c
y
b
er
th
r
ea
ts
.
E
x
a
m
p
les
o
f
th
e
th
r
ea
ts
ar
e
p
h
is
h
i
n
g
attac
k
s
,
f
ak
e
web
s
ites
an
d
s
o
cial
m
ed
ia
s
ca
m
s
.
T
h
ese
th
r
ea
ts
ar
e
b
r
ea
c
h
es
th
at
m
an
ip
u
late
c
o
m
p
a
n
y
b
r
a
n
d
s
,
cu
s
to
m
er
s
an
d
em
p
l
o
y
e
es'
d
ata
f
o
r
illeg
al
p
u
r
p
o
s
es.
B
r
an
d
m
o
n
ito
r
in
g
in
clu
d
es
co
llectin
g
an
d
an
al
y
zin
g
co
n
ten
t
f
r
o
m
v
ar
i
o
u
s
d
ig
ital
ch
an
n
els,
d
etec
tin
g
b
r
an
d
r
is
k
s
as
th
ey
ap
p
ea
r
an
d
allo
win
g
cy
b
er
s
ec
u
r
ity
team
s
t
o
r
em
ed
iate
in
s
tan
ce
s
o
f
b
r
a
n
d
ab
u
s
e
b
ef
o
r
e
t
h
ey
n
eg
ativ
ely
im
p
ac
t
t
h
e
c
u
s
to
m
er
ex
p
er
ien
ce
.
I
n
to
d
ay
'
s
en
v
ir
o
n
m
en
t,
wh
er
e
d
ata
b
r
ea
c
h
es
ar
e
in
c
r
e
asin
g
ly
co
m
m
o
n
,
p
r
o
ac
tiv
ely
id
en
tif
y
in
g
an
d
m
itig
atin
g
p
o
ten
tial
t
h
r
ea
ts
is
ess
en
tial.
C
u
r
r
en
t
ea
r
ly
th
r
ea
t
d
etec
tio
n
m
eth
o
d
s
r
ely
o
n
cy
b
er
s
ec
u
r
ity
an
aly
s
ts
'
m
an
u
al
an
aly
s
is
o
f
r
aw
n
etwo
r
k
t
r
af
f
ic,
u
tili
zin
g
f
r
am
ewo
r
k
s
s
u
ch
as
th
e
MI
T
R
E
AT
T
&
C
K
f
r
am
ewo
r
k
[
1
5
]
.
Fu
r
th
e
r
m
o
r
e
,
ex
is
ti
n
g
s
tu
d
i
es
a
d
d
r
ess
i
n
g
d
a
ta
b
r
ea
c
h
is
s
u
e
s
o
f
t
e
n
o
v
e
r
l
o
o
k
t
h
e
n
e
e
d
f
o
r
r
ea
l
-
t
im
e
m
o
n
i
to
r
i
n
g
a
n
d
a
n
al
y
s
is
a
n
d
t
h
e
i
n
t
e
g
r
ati
o
n
o
f
a
d
v
an
ce
d
te
c
h
n
o
l
o
g
ies
,
as
n
o
t
ed
i
n
[
1
6
]
–
[
2
1
]
.
T
h
is
o
v
e
r
s
i
g
h
t
le
ad
s
to
in
e
f
f
i
ci
en
cies
i
n
ad
d
r
ess
i
n
g
d
at
a
b
r
e
ac
h
ch
all
en
g
es.
T
o
t
ac
k
le
t
h
is
p
r
o
b
le
m
,
t
h
e
i
n
te
g
r
a
te
d
f
r
a
m
ew
o
r
k
p
r
o
p
o
s
e
d
in
t
h
is
r
esea
r
ch
ai
m
s
t
o
i
n
c
o
r
p
o
r
ate
th
r
e
at
in
tel
li
g
e
n
c
e.
B
y
u
ti
lizi
n
g
d
a
ta
v
is
u
a
liz
ati
o
n
o
n
th
e
d
as
h
b
o
ar
d
,
t
h
e
f
r
am
ew
o
r
k
f
ac
ilit
ates
r
e
al
-
ti
m
e
s
u
r
v
ei
lla
n
ce
a
n
d
p
r
o
v
i
d
es
a
n
o
tifi
ca
ti
o
n
m
ec
h
an
is
m
f
o
r
a
n
y
i
n
ci
d
en
ts
.
T
h
is
r
esear
ch
d
elv
es
in
to
th
e
c
y
b
er
s
p
ac
e
en
v
i
r
o
n
m
e
n
t
o
f
Ma
l
ay
s
ia,
wh
ich
d
is
tin
g
u
is
h
es
th
e
d
is
tin
ctiv
e
ch
allen
g
es
an
d
o
p
p
o
r
tu
n
ities
.
T
h
e
in
cr
ea
s
in
g
f
r
eq
u
e
n
cy
an
d
co
m
p
lex
ity
o
f
cy
b
er
th
r
ea
ts
[
2
2
]
n
ec
ess
itate
a
co
m
p
r
eh
e
n
s
iv
e
u
n
d
er
s
tan
d
in
g
o
f
th
e
n
atu
r
e
o
f
d
ata
b
r
ea
ch
e
s
[
2
3
]
,
[
2
4
]
,
wh
ich
h
o
ld
s
s
ig
n
if
ican
t
im
p
o
r
tan
ce
.
T
h
ese
b
r
ea
ch
es
h
ig
h
lig
h
t
th
e
i
m
p
o
r
tan
ce
o
f
p
r
o
ac
tiv
e
m
o
n
ito
r
in
g
as
a
f
o
r
m
o
f
d
ef
en
s
e
[
2
5
]
as
h
u
m
an
m
is
tak
es,
s
o
cial
en
g
in
ee
r
in
g
,
a
n
d
o
v
er
s
ig
h
ts
in
cy
b
er
h
y
g
ien
e
o
f
ten
ca
u
s
e
th
em
.
T
h
is
s
tu
d
y
aim
s
to
e
s
tab
lis
h
a
co
n
n
ec
tio
n
b
etwe
en
cy
b
er
s
ec
u
r
ity
an
d
th
e
h
u
m
an
co
m
p
o
n
en
t,
em
p
h
asizi
n
g
th
eir
in
te
r
r
elatio
n
s
h
ip
.
T
h
e
m
ain
o
b
jectiv
e
o
f
th
is
s
tu
d
y
is
to
d
ev
elo
p
a
cu
s
to
m
ized
b
r
an
d
m
o
n
ito
r
in
g
m
eth
o
d
o
lo
g
y
s
p
ec
if
ically
d
esig
n
ed
f
o
r
th
e
d
ig
ital
lan
d
s
ca
p
e
in
Ma
lay
s
ia.
B
y
u
tili
zin
g
d
ata
an
aly
tics
an
d
d
em
o
n
s
tr
atin
g
ex
p
er
tis
e
in
c
y
b
er
s
ec
u
r
ity
,
th
i
s
p
r
o
ject
aim
s
to
r
ev
ea
l
p
o
te
n
tial
h
az
ar
d
s
with
in
t
h
e
h
i
d
d
en
d
ep
th
s
o
f
t
h
e
d
a
r
k
web
.
B
y
en
g
ag
in
g
in
t
h
is
p
r
ac
t
ice,
th
e
o
b
jectiv
e
is
to
eq
u
ip
o
r
g
an
izatio
n
s
with
th
e
n
ec
ess
ar
y
r
eso
u
r
ce
s
to
d
etec
t
p
o
ten
tial
s
ec
u
r
ity
b
r
ea
ch
es
[
2
6
]
a
n
d
u
n
d
e
r
s
tan
d
th
e
tactics
em
p
lo
y
ed
b
y
cy
b
e
r
attac
k
er
s
.
Sit
u
ated
at
th
e
co
n
v
er
g
en
ce
o
f
d
ig
ital
a
d
v
an
c
em
en
t
an
d
s
ec
u
r
ity
co
m
p
lex
ities
,
th
is
r
esear
ch
is
b
ey
o
n
d
th
e
o
r
etica
l
d
is
cu
s
s
io
n
.
T
h
is
tech
n
o
lo
g
y
h
as
th
e
p
o
t
en
tial
to
p
r
o
v
id
e
p
r
ac
tical
i
n
s
ig
h
ts
th
at
ca
n
s
tr
en
g
th
en
t
h
e
ab
ilit
y
o
f
b
o
th
o
r
g
an
izatio
n
s
an
d
in
d
iv
id
u
als
to
with
s
tan
d
an
d
o
v
er
co
m
e
im
m
in
en
t
th
r
ea
ts
.
T
h
e
em
p
h
asis
o
n
Ma
lay
s
ia
's
cy
b
er
s
p
ac
e
h
ig
h
lig
h
ts
th
e
i
m
p
o
r
tan
ce
o
f
im
p
lem
en
tin
g
p
r
o
ac
tiv
e
c
y
b
er
s
ec
u
r
ity
m
ea
s
u
r
es
an
d
p
r
o
v
id
in
g
s
tak
eh
o
ld
er
s
with
t
h
e
ess
en
tial
k
n
o
wled
g
e
t
o
p
r
o
tect
th
ei
r
d
i
g
ital
d
o
m
ain
.
T
h
is
s
tu
d
y
ai
m
s
to
ex
p
l
o
r
e
t
h
e
d
a
r
k
web
,
s
p
ec
if
ically
its
ass
o
ciati
o
n
s
with
d
ata
b
r
ea
c
h
es,
ex
a
m
in
e
b
r
an
d
m
o
n
ito
r
in
g
m
eth
o
d
s
an
d
d
ev
elo
p
a
co
m
p
lete
f
r
am
ewo
r
k
f
o
r
en
h
a
n
cin
g
Ma
lay
s
ia'
s
d
ig
ital
s
ec
u
r
i
ty
m
ea
s
u
r
es.
T
h
e
p
r
im
a
r
y
o
b
jectiv
e
o
f
th
is
s
tu
d
y
is
t
o
en
h
an
ce
co
m
p
r
eh
en
s
io
n
o
f
d
ata
b
r
ea
ch
r
is
k
s
an
d
im
p
lem
e
n
t m
ea
s
u
r
es to
p
r
o
tect
d
ig
ital
en
v
ir
o
n
m
en
ts
.
T
h
is
s
tu
d
y
en
h
an
ce
s
th
e
d
etec
t
io
n
p
h
ase
in
th
e
Natio
n
al
I
n
s
titu
te
o
f
Stan
d
ar
d
s
a
n
d
T
ec
h
n
o
l
o
g
y
(
NI
ST)
C
y
b
er
s
ec
u
r
ity
Fra
m
ewo
r
k
.
N
I
ST
f
r
am
ewo
r
k
is
th
e
lead
in
g
cy
b
er
s
ec
u
r
ity
s
tan
d
ar
d
[
2
7
]
a
n
d
is
r
ef
er
r
ed
t
o
b
y
m
an
y
.
On
e
o
f
th
e
elem
en
ts
i
n
t
h
e
d
e
t
e
c
t
p
h
r
a
s
e
i
s
d
a
t
a
b
r
e
a
c
h
,
a
n
d
t
h
i
s
w
o
r
k
i
n
t
r
o
d
u
c
e
s
a
n
e
w
s
o
l
u
t
i
o
n
r
e
l
a
t
e
d
t
o
d
a
t
a
b
r
e
a
c
h
e
s
.
I
t
c
o
m
b
i
n
e
s
t
h
e
d
a
t
a
b
r
e
a
c
h
s
t
r
a
t
e
g
y
wi
t
h
t
h
e
b
r
an
d
m
o
n
i
t
o
r
i
n
g
c
o
n
c
e
p
t
i
n
t
h
e
c
y
b
e
r
s
e
c
u
r
i
t
y
d
o
m
a
i
n
.
T
h
e
p
h
a
s
e
i
n
t
h
e
n
e
w
f
r
a
m
e
wo
r
k
c
o
n
s
i
s
t
s
o
f
d
a
ta
c
o
ll
e
c
ti
o
n
,
i
n
t
e
g
r
a
ti
o
n
,
m
o
n
i
t
o
r
i
n
g
ca
p
a
b
i
l
i
ti
e
s
,
o
p
e
n
-
s
o
u
r
ce
u
t
i
l
i
z
at
i
o
n
,
a
n
d
d
at
a
v
is
u
a
l
iz
a
t
io
n
,
p
r
o
m
i
s
e
s
a
h
o
l
is
ti
c
a
p
p
r
o
a
ch
t
o
w
a
r
d
s
c
o
m
b
a
t
i
n
g
th
e
ev
o
lv
in
g
s
ec
u
r
ity
th
r
ea
ts
.
I
n
s
u
m
m
a
r
y
,
th
is
r
esear
ch
ex
p
lo
r
es
th
e
e
v
o
lv
in
g
lan
d
s
ca
p
e
o
f
d
ata
b
r
ea
ch
es
an
d
b
r
a
n
d
m
o
n
ito
r
in
g
in
th
e
ev
er
-
c
h
an
g
i
n
g
d
ig
ital
r
ea
l
m
.
Sectio
n
1
,
th
e
i
n
tr
o
d
u
ctio
n
,
h
as
s
et
th
e
s
tag
e
b
y
h
i
g
h
lig
h
tin
g
th
e
escalatin
g
T
h
r
ea
t
o
f
d
ata
b
r
ea
c
h
es,
th
eir
f
ar
-
r
ea
ch
in
g
co
n
s
eq
u
e
n
ce
s
,
an
d
th
e
r
is
in
g
p
r
o
m
in
en
ce
o
f
t
h
e
d
ar
k
web
as
a
b
r
ee
d
in
g
g
r
o
u
n
d
f
o
r
c
y
b
er
c
r
im
in
al
ac
tiv
ities
.
I
t
h
as
also
u
n
d
er
s
co
r
e
d
th
e
s
ig
n
if
ican
ce
o
f
p
r
o
ac
tiv
e
b
r
an
d
m
o
n
ito
r
in
g
,
an
d
t
h
e
u
n
iq
u
e
ch
allen
g
es
an
d
o
p
p
o
r
tu
n
ities
p
r
esen
t
in
Ma
lay
s
ia's
cy
b
er
s
p
ac
e.
S
ec
tio
n
2
in
tr
o
d
u
ce
s
th
e
n
o
v
el
b
r
a
n
d
m
o
n
ito
r
in
g
f
r
am
ewo
r
k
p
r
o
p
o
s
ed
in
t
h
is
s
tu
d
y
,
s
h
ed
d
in
g
lig
h
t
o
n
d
etec
tin
g
d
ata
b
r
ea
ch
e
v
en
ts
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
3
,
J
u
n
e
20
25
:
3
1
6
2
-
3
1
7
0
3164
[
2
8
]
ac
r
o
s
s
s
ec
to
r
s
an
d
lo
ca
t
io
n
s
an
d
th
eir
c
o
r
r
elatio
n
.
T
h
e
in
tr
o
d
u
ctio
n
o
f
th
e
n
o
v
el
b
r
an
d
m
o
n
ito
r
in
g
f
r
am
ewo
r
k
s
ig
n
if
ies
a
s
ig
n
if
ican
t
co
n
tr
ib
u
tio
n
to
cy
b
e
r
s
ec
u
r
ity
,
o
f
f
e
r
in
g
a
n
in
n
o
v
ativ
e
ap
p
r
o
ac
h
to
s
af
eg
u
ar
d
in
g
b
r
a
n
d
in
te
g
r
ity
i
n
th
e
d
ig
ital
ag
e.
Nex
t
in
s
ec
t
io
n
3
is
th
e
m
et
h
o
d
o
lo
g
y
,
wh
ich
d
elv
es
in
to
th
e
s
y
s
tem
atic
f
r
am
ewo
r
k
em
p
lo
y
ed
f
o
r
th
is
r
esear
ch
,
en
co
m
p
ass
in
g
d
ata
co
llectio
n
,
in
teg
r
atio
n
,
m
o
n
ito
r
in
g
ca
p
ab
ilit
ies,
o
p
en
-
s
o
u
r
ce
u
tili
za
tio
n
,
an
d
d
ata
v
is
u
aliza
tio
n
,
wh
ich
in
clu
d
es
aler
ts
,
d
ash
b
o
ar
d
s
,
r
ep
o
r
ts
,
an
d
n
o
tific
atio
n
s
.
Sectio
n
4
c
o
n
tai
n
s
th
e
r
esu
lts
an
d
d
is
cu
s
s
io
n
,
wh
ich
p
r
o
v
id
es
a
co
m
p
r
eh
e
n
s
iv
e
an
aly
s
is
o
f
th
e
f
in
d
in
g
s
an
d
co
m
p
a
r
is
o
n
s
with
th
e
ex
is
tin
g
wo
r
k
in
th
e
m
ar
k
et.
Fin
ally
,
Sectio
n
5
is
th
e
co
n
clu
s
i
o
n
,
wh
ich
will
s
y
n
th
esize
th
ese
in
s
ig
h
ts
,
em
p
h
asizin
g
th
e
p
r
ac
tical
im
p
licatio
n
s
o
f
th
is
r
esear
ch
in
en
h
an
cin
g
b
r
an
d
s
ec
u
r
ity
an
d
r
esil
ien
ce
in
th
e
f
ac
e
o
f
e
m
er
g
in
g
c
y
b
er
th
r
ea
ts
.
2.
P
RO
P
O
SE
D
F
RA
M
E
WO
R
K
O
F
DARK
WE
B
B
RAND
M
O
NI
T
O
RING
(
DW
B
M
)
SYST
E
M
T
h
e
f
r
a
m
ewo
r
k
f
o
r
d
etec
tin
g
an
d
m
o
n
ito
r
in
g
d
ata
b
r
ea
c
h
es
co
m
p
r
is
es
ess
en
tial
co
m
p
o
n
e
n
ts
th
at
co
o
p
er
ate
to
d
eliv
e
r
a
co
m
p
r
eh
en
s
iv
e
cy
b
er
s
ec
u
r
ity
s
o
l
u
tio
n
.
Fig
u
r
e
1
s
h
o
ws
th
e
p
r
o
p
o
s
ed
in
teg
r
ated
f
r
am
ewo
r
k
f
o
r
d
ata
b
r
ea
ch
es
o
n
th
e
d
a
r
k
web
[
2
9
]
,
[
3
0
]
in
b
r
an
d
m
o
n
ito
r
in
g
d
ata
h
u
n
tin
g
.
T
h
e
c
o
llectio
n
o
f
p
r
o
b
a
b
le
d
ata
b
r
ea
ch
s
ig
n
s
[
3
1
]
f
ac
ilit
ates
a
v
ar
iety
o
f
d
ata
s
o
u
r
ce
s
,
in
clu
d
in
g
d
ar
k
web
f
o
r
u
m
s
[
3
2
]
,
u
n
d
er
g
r
o
u
n
d
ch
an
n
els,
an
d
th
e
m
ess
ag
in
g
p
latf
o
r
m
T
eleg
r
a
m
.
Py
th
o
n
s
cr
ip
ts
u
tili
ze
t
h
e
p
u
r
p
o
s
e
o
f
e
x
tr
ac
tin
g
d
ata
ef
f
ec
tiv
el
y
,
wh
ile
a
T
ele
g
r
am
b
o
t
is
em
p
lo
y
ed
t
o
s
im
p
lify
th
e
in
g
esti
o
n
o
f
th
is
d
at
a
in
to
th
e
Sp
l
u
n
k
p
latf
o
r
m
.
I
n
th
e
co
n
tex
t
o
f
Sp
lu
n
k
,
th
e
d
ata
u
n
d
er
g
o
es
o
r
g
an
ized
tr
an
s
f
o
r
m
atio
n
,
f
a
cilitatin
g
ef
f
icien
t
p
r
o
ce
s
s
in
g
an
d
an
aly
s
is
.
R
ea
l
-
tim
e
m
o
n
ito
r
in
g
,
in
c
o
r
p
o
r
atin
g
r
u
le
-
b
ased
d
etec
tio
n
[
3
3
]
,
[
1
4]
,
co
n
s
titu
tes
a
v
ital
ch
ar
ac
ter
is
tic
th
at
r
ap
id
ly
n
o
tifie
s
r
elev
an
t
s
tak
eh
o
ld
er
s
o
f
p
o
ten
tially
s
u
s
p
icio
u
s
ac
tiv
ities
.
Op
en
-
s
o
u
r
ce
to
o
ls
u
tili
ze
co
s
t
-
ef
f
ec
tiv
en
ess
an
d
o
p
tim
iz
e
th
e
u
tili
za
tio
n
o
f
r
eso
u
r
ce
s
.
Data
v
is
u
aliza
tio
n
p
lay
s
a
cr
u
cial
r
o
le
in
v
ar
io
u
s
asp
ec
ts
,
in
clu
d
in
g
p
r
o
v
i
d
in
g
r
e
al
-
tim
e
war
n
in
g
s
,
cr
ea
tin
g
v
is
u
al
d
ash
b
o
ar
d
s
,
g
en
er
atin
g
co
m
p
r
eh
en
s
iv
e
r
ep
o
r
ts
,
an
d
d
is
tr
ib
u
tin
g
n
o
tific
atio
n
s
v
ia
Dis
co
r
d
web
h
o
o
k
s
an
d
T
eleg
r
am
ch
an
n
els.
T
h
e
p
r
esen
ted
co
m
p
r
eh
e
n
s
iv
e
f
r
am
ewo
r
k
p
r
o
v
id
es
o
r
g
a
n
izatio
n
s
with
th
e
to
o
ls
to
p
r
o
tec
t
d
ig
ital
ass
et
s
an
d
ef
f
ec
tiv
ely
ad
d
r
ess
em
er
g
in
g
cy
b
er
r
is
k
s
p
r
o
m
p
tly
.
Fig
u
r
e
1
.
T
h
e
p
r
o
p
o
s
ed
d
ata
b
r
ea
ch
f
r
am
ew
o
r
k
3.
RE
S
E
ARCH
M
E
T
H
O
D
S
T
h
e
d
iag
r
am
illu
s
tr
ated
in
Fig
u
r
e
2
o
f
f
er
s
a
v
is
u
al
r
ep
r
esen
t
atio
n
o
f
th
e
o
p
er
atio
n
al
wo
r
k
f
l
o
w
r
elate
d
to
th
e
s
y
s
tem
'
s
f
u
n
ctio
n
ality
in
th
e
co
n
tex
t
o
f
r
ea
l
-
tim
e
d
etec
t
io
n
o
f
d
ata
b
r
ea
c
h
es
an
d
s
u
b
s
eq
u
en
t
aler
tin
g
.
T
h
e
f
ir
s
t
p
h
ase
in
v
o
lv
es
u
s
in
g
a
P
y
th
o
n
s
cr
ip
t
to
m
eth
o
d
ically
c
o
llect
an
d
r
etr
iev
e
r
elev
an
t
i
n
f
o
r
m
atio
n
an
d
d
ata
f
r
o
m
I
n
te
r
n
et
p
latf
o
r
m
s
o
n
th
e
d
ar
k
web
.
Af
ter
th
e
f
ir
s
t
d
ata
-
c
o
llectin
g
p
r
o
ce
d
u
r
e,
th
e
o
b
tain
ed
d
ata
is
in
g
ested
in
to
th
e
Sp
lu
n
k
p
latf
o
r
m
.
T
h
e
Sp
lu
n
k
p
latf
o
r
m
en
ab
les
a
th
o
r
o
u
g
h
an
aly
s
is
p
r
o
ce
s
s
,
wh
ich
in
v
o
lv
es
u
s
in
g
cu
s
to
m
r
u
les
th
at
ar
e
ca
r
ef
u
lly
ad
ju
s
ted
to
s
u
cc
ess
f
u
lly
h
an
d
le
th
e
d
is
tin
ct
lo
ca
l
b
r
a
n
d
n
am
es
th
at
ar
e
p
o
p
u
lar
in
Ma
lay
s
ia.
T
h
e
p
r
ec
e
d
in
g
r
e
g
u
latio
n
s
'
d
esig
n
is
to
s
tr
ea
m
lin
e
th
e
p
r
o
ce
s
s
o
f
co
n
d
u
ctin
g
d
aily
s
ea
r
ch
es
b
y
a
p
r
ed
eter
m
in
e
d
s
ch
ed
u
le.
I
f
th
e
d
ata
f
ails
to
m
ee
t
th
e
p
r
ed
ete
r
m
in
ed
cr
iter
ia
f
o
r
a
d
ata
b
r
ea
ch
,
th
e
s
y
s
tem
will
d
is
ca
r
d
it
p
r
o
m
p
tly
,
lead
in
g
to
th
e
co
m
p
letio
n
o
f
th
e
co
m
p
le
te
p
r
o
ce
d
u
r
e
s
eq
u
en
ce
.
On
ce
a
d
ata
b
r
ea
ch
ev
en
t
id
en
tifie
s
th
r
ea
ts
p
o
s
itiv
ely
,
th
e
p
r
e
-
estab
lis
h
ed
p
r
o
to
co
ls
wi
th
in
th
e
Sp
lu
n
k
s
y
s
tem
ar
e
im
m
ed
iately
in
itiated
.
T
h
e
in
itiatio
n
o
f
Sp
lu
n
k
p
r
o
m
p
ts
a
s
er
ies
o
f
ac
tio
n
s
in
wh
ich
n
o
tific
atio
n
s
ar
e
d
is
s
em
in
ated
to
u
s
er
s
th
r
o
u
g
h
th
e
u
tili
za
tio
n
o
f
a
Dis
co
r
d
we
b
h
o
o
k
in
teg
r
atio
n
an
d
a
d
esig
n
ated
T
eleg
r
am
ch
a
n
n
el.
T
h
is
tech
n
iq
u
e
en
h
an
ce
s
th
e
tim
ely
an
d
e
f
f
icien
t r
e
p
o
r
ti
n
g
o
f
in
cid
en
ts
,
en
h
an
cin
g
th
e
o
v
er
all
ef
f
icac
y
o
f
i
n
cid
en
t m
a
n
ag
em
en
t.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
A
n
in
teg
r
a
ted
fr
a
mewo
r
k
fo
r
d
a
ta
b
r
ea
c
h
o
n
th
e
d
a
r
k
w
eb
in
b
r
a
n
d
…
(
S
iti A
r
p
a
h
b
in
ti A
h
ma
d
)
3165
Fig
u
r
e
2
.
Pro
ce
s
s
f
lo
w
o
f
th
e
b
r
an
d
m
o
n
ito
r
in
g
f
r
am
ewo
r
k
(
r
ea
l tim
e
d
etec
tio
n
)
4.
RE
SU
L
T
S AN
D
D
I
SCU
SS
I
O
N
R
esu
lts
ar
e
illu
s
tr
ate
d
u
s
in
g
s
ev
er
al
f
i
g
u
r
es.
Fig
u
r
e
3
is
th
e
d
ar
k
web
b
r
an
d
m
o
n
ito
r
in
g
(
DW
B
M)
s
y
s
tem
in
ter
f
ac
e
.
Fig
u
r
e
4
is
t
h
e
r
ea
l
-
tim
e
aler
t
p
r
o
ce
s
s
s
cr
ip
t
f
o
r
th
e
aler
t
n
o
tific
atio
n
i
n
d
is
co
r
d
(
as
s
ee
n
in
Fig
u
r
e
5
)
an
d
teleg
r
am
(
as
s
ee
n
in
Fig
u
r
e
6
)
.
T
ab
le
1
s
h
o
ws
th
e
test
in
g
r
esu
lts
o
f
d
ata
b
r
ea
c
h
tr
en
d
s
in
Ma
lay
s
ia
an
d
T
ab
le
2
d
is
p
lay
s
th
e
co
m
p
ar
is
o
n
with
o
th
er
a
v
a
i
l
ab
le
to
o
ls
o
n
lin
e.
4
.
1
.
DWB
M
s
y
s
t
em
T
h
e
DW
B
M
s
y
s
tem
r
ep
r
esen
ts
a
s
ig
n
if
ican
t
ad
v
a
n
ce
m
en
t
in
th
e
r
ea
lm
o
f
cy
b
e
r
s
ec
u
r
ity
.
Fig
u
r
e
3
s
h
o
ws
th
e
in
ter
f
ac
e
o
f
th
e
D
W
B
M
p
latf
o
r
m
.
T
h
e
in
p
u
t
f
o
r
DW
B
M
is
tim
e
r
an
g
e,
co
u
n
t
r
y
an
d
b
r
an
d
.
T
h
ese
in
p
u
ts
ac
t
as
a
f
ilter
to
s
ea
r
ch
f
o
r
p
o
ten
tial
d
ata
b
r
ea
c
h
ev
e
n
ts
.
T
h
ese
ev
en
ts
ar
e
d
is
p
lay
ed
o
n
th
e
d
ash
b
o
ar
d
b
ase
d
o
n
r
eg
io
n
s
an
d
s
ec
to
r
s
.
T
h
er
e
ar
e
th
r
ee
(
3
)
r
eg
io
n
s
:
all
r
eg
io
n
s
o
r
all
o
v
er
th
e
wo
r
l
d
,
Ma
lay
s
ia
an
d
o
th
er
s
.
As
f
o
r
s
ec
to
r
s
,
th
er
e
ar
e
f
o
u
r
(
4
)
s
ec
to
r
s
:
g
o
v
er
n
m
e
n
t,
ed
u
ca
tio
n
,
b
a
n
k
in
g
an
d
o
th
er
s
.
W
ith
its
ex
ten
s
iv
e
co
v
er
ag
e
o
f
d
ata
s
o
u
r
ce
s
,
in
cl
u
d
in
g
th
e
Dar
k
W
eb
,
s
to
len
d
ata
u
n
d
e
r
g
r
o
u
n
d
f
o
r
u
m
s
,
an
d
ch
an
n
els,
DW
B
M
p
r
o
v
id
es
a
b
r
o
ad
er
v
iew
o
f
p
o
ten
tial
b
r
an
d
th
r
ea
ts
.
I
ts
co
m
p
r
eh
en
s
iv
e
s
et
o
f
f
ea
tu
r
es
s
ets
it
ap
ar
t,
in
clu
d
i
n
g
r
ea
l
-
tim
e
m
o
n
ito
r
in
g
,
a
d
v
an
c
ed
s
ea
r
ch
f
u
n
ctio
n
alities
,
b
r
a
n
d
m
o
n
ito
r
i
n
g
,
th
r
ea
t
i
n
tellig
en
ce
,
an
d
o
f
f
e
n
s
iv
e
s
ec
u
r
ity
f
ea
tu
r
es.
I
ts
s
ea
m
less
in
teg
r
atio
n
wi
th
s
ec
u
r
ity
i
n
f
o
r
m
atio
n
an
d
ev
en
t
m
an
ag
em
en
t
(
SIE
M
)
an
d
s
ec
u
r
ity
o
r
ch
estra
tio
n
,
a
u
to
m
atio
n
,
an
d
r
esp
o
n
s
e
(
SOAR
)
p
latf
o
r
m
s
allo
ws
f
o
r
ef
f
icien
t
co
llab
o
r
atio
n
a
n
d
au
to
m
atio
n
in
th
e
in
cid
e
n
t
r
esp
o
n
s
e
p
r
o
ce
s
s
.
Mo
r
eo
v
er
,
DW
B
M'
s
o
p
en
-
s
o
u
r
ce
n
at
u
r
e
elim
in
ates
lic
en
s
in
g
f
ee
s
,
m
ak
in
g
it
an
ass
et
f
o
r
NG
Os,
b
u
s
in
ess
es,
an
d
co
m
m
u
n
ity
in
itiativ
es.
I
n
an
in
cr
e
asin
g
ly
d
ig
ital
an
d
in
ter
co
n
n
ec
ted
wo
r
ld
,
DW
B
M
em
er
g
es
as
a
p
o
wer
f
u
l
to
o
l
to
b
o
ls
ter
c
y
b
er
s
ec
u
r
ity
,
p
r
o
tect
b
r
a
n
d
s
,
an
d
co
n
tr
ib
u
te
p
o
s
itiv
ely
to
th
e
b
r
o
ad
er
co
m
m
u
n
ity
.
Fig
u
r
e
4
s
h
o
ws
th
e
D
W
B
M
p
latf
o
r
m
'
s
r
ea
l
-
tim
e
aler
tin
g
p
r
o
ce
s
s
.
W
h
en
th
e
r
u
les
tr
ig
g
er
ed
co
n
tain
in
f
o
r
m
atio
n
ab
o
u
t M
alay
a
o
r
Ma
lay
s
ia,
n
o
tific
atio
n
s
will
b
e
s
en
t
to
Dis
co
r
d
an
d
T
eleg
r
am
.
Fig
u
r
e
s
5
an
d
6
a
r
e
ex
a
m
p
les
o
f
aler
t
s
r
elate
d
to
Ma
lay
a
Sig
n
atu
r
e
d
etec
ted
an
d
n
o
tifie
d
u
s
in
g
Dis
co
r
d
an
d
T
eleg
r
a
m
.
T
h
e
d
is
p
lay
in
Dis
co
r
d
s
h
o
ws
th
e
lev
el
o
f
s
ev
er
ity
an
d
th
e
lin
k
f
o
r
th
e
s
y
s
tem
ad
m
in
is
tr
ato
r
to
d
o
f
u
r
th
er
in
v
esti
g
atio
n
.
T
h
e
m
ess
ag
e
in
T
eleg
r
am
co
n
tain
s
th
e
aler
t
n
am
e
,
s
ev
er
ity
,
an
d
lin
k
f
o
r
th
e
s
y
s
tem
ad
m
in
is
tr
ato
r
to
tak
e
f
u
r
t
h
er
ac
tio
n
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
3
,
J
u
n
e
20
25
:
3
1
6
2
-
3
1
7
0
3166
Fig
u
r
e
3
.
T
h
e
in
ter
f
ac
e
o
f
th
e
DW
B
M
p
latf
o
r
m
Fig
u
r
e
4
.
E
x
am
p
le
o
f
th
e
r
ea
l
-
tim
e
aler
tin
g
p
r
o
ce
s
s
Fig
u
r
e
5
.
E
x
am
p
le
o
f
aler
t n
o
t
if
icatio
n
in
Dis
co
r
d
Fig
u
r
e
6
.
E
x
am
p
le
o
f
aler
t n
o
t
if
icatio
n
in
T
eleg
r
a
m
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
A
n
in
teg
r
a
ted
fr
a
mewo
r
k
fo
r
d
a
ta
b
r
ea
c
h
o
n
th
e
d
a
r
k
w
eb
in
b
r
a
n
d
…
(
S
iti A
r
p
a
h
b
in
ti A
h
ma
d
)
3167
T
ab
le
1
.
Mo
s
t lo
ca
tio
n
s
r
elate
d
to
d
ata
b
r
ea
ch
b
ased
o
n
th
e
d
ata
f
in
d
in
g
s
Lo
c
a
t
i
o
n
C
o
u
n
t
P
e
r
c
e
n
t
S
h
a
h
A
l
a
m,
S
e
l
a
n
g
o
r
20
1
9
.
4
1
7
%
K
u
a
l
a
L
u
m
p
u
r
,
W
i
l
a
y
a
h
P
e
r
se
k
u
t
u
a
n
K
u
a
l
a
L
u
m
p
u
r
9
8
.
7
3
8
%
A
l
o
r
S
e
t
a
r
,
K
e
d
a
h
6
5
.
8
2
5
%
K
o
t
a
K
i
n
a
b
a
l
u
,
S
a
b
a
h
5
4
.
8
5
4
%
B
a
y
a
n
L
e
p
a
s,
P
u
l
a
u
P
i
n
a
n
g
4
3
.
8
8
3
%
M
e
l
a
k
a
,
M
e
l
a
k
a
4
3
.
8
8
3
%
K
o
t
a
B
h
a
r
u
K
e
l
a
n
t
a
n
3
2
.
9
1
3
%
S
i
t
i
a
w
a
n
,
P
e
r
a
k
3
2
.
9
1
3
%
S
u
n
g
a
i
P
e
t
a
n
i
,
K
e
d
a
h
3
2
.
9
1
3
%
Ta
se
k
G
e
l
u
g
o
r
,
P
u
l
a
u
P
i
n
a
n
g
3
2
.
9
1
3
%
4
.
2
.
Co
m
pa
riso
n
wit
h o
t
her
t
o
o
ls
a
v
a
ila
ble o
nli
ne
I
n
o
r
d
e
r
to
to
ass
ess
th
e
s
tr
en
g
th
s
an
d
wea
k
n
ess
es
o
f
th
e
p
r
o
p
o
s
ed
DW
B
M,
a
co
m
p
r
eh
en
s
iv
e
an
aly
s
is
was
co
n
d
u
cted
ag
ain
s
t
th
r
ee
lead
in
g
co
m
p
etito
r
s
:
Dar
k
Owl,
Dig
ital
Sh
ad
o
ws,
an
d
Flas
h
p
o
in
t
as
d
ep
icted
in
T
ab
le
2
.
T
h
e
co
m
p
ar
is
o
n
co
v
er
s
k
ey
f
ea
tu
r
es
in
clu
d
i
n
g
d
ata
s
o
u
r
ce
s
,
m
o
n
ito
r
in
g
ca
p
ab
ilit
ies,
in
teg
r
atio
n
o
p
tio
n
s
,
d
ata
v
is
u
aliza
tio
n
,
d
ata
co
llectio
n
m
eth
o
d
s
an
d
s
u
b
s
cr
ip
tio
n
m
o
d
els.
T
h
is
d
et
ailed
an
aly
s
is
was
p
er
f
o
r
m
ed
n
o
t
o
n
l
y
to
u
n
d
er
s
ta
n
d
h
o
w
t
h
e
p
r
o
p
o
s
ed
p
latf
o
r
m
co
m
p
ar
es
to
ex
is
tin
g
s
o
lu
tio
n
s
b
u
t
also
to
id
e
n
tify
ar
ea
s
wh
er
e
th
e
p
r
o
p
o
s
ed
DW
B
M
to
o
l
o
f
f
er
s
s
u
p
e
r
io
r
f
u
n
cti
o
n
ality
,
f
lex
i
b
ilit
y
,
an
d
af
f
o
r
d
ab
ilit
y
.
T
h
e
g
o
al
is
to
p
r
o
v
id
e
b
u
s
in
ess
es
an
d
s
ec
u
r
ity
p
r
o
f
ess
io
n
als
with
an
ad
v
an
ce
d
,
o
p
en
-
s
o
u
r
ce
alter
n
ativ
e
th
at
m
ee
ts
th
ei
r
b
r
an
d
m
o
n
ito
r
in
g
a
n
d
cy
b
e
r
s
e
cu
r
ity
n
ee
d
s
in
a
co
m
p
r
eh
en
s
i
v
e
an
d
c
o
s
t
-
ef
f
ec
tiv
e
m
a
n
n
er
.
T
ab
le
2
.
T
h
e
co
m
p
ar
is
o
n
s
o
f
a
f
ew
DW
B
M
p
latf
o
r
m
s
D
a
r
k
O
w
l
D
i
g
i
t
a
l
S
h
a
d
o
w
s
F
l
a
s
h
p
o
i
n
t
D
W
B
M
(
P
r
o
p
o
se
d
)
D
a
t
a
so
u
r
c
e
c
o
v
e
r
e
d
W
i
d
e
r
a
n
g
e
o
f
d
a
t
a
so
u
r
c
e
s
D
a
r
k
w
e
b
a
n
d
d
i
g
i
t
a
l
r
i
sk
U
n
d
e
r
g
r
o
u
n
d
f
o
r
u
ms
D
a
r
k
w
e
b
,
st
o
l
e
n
d
a
t
a
,
u
n
d
e
r
g
r
o
u
n
d
f
o
r
u
m,
a
n
d
c
h
a
n
n
e
l
M
o
n
i
t
o
r
i
n
g
c
a
p
a
b
i
l
i
t
i
e
s
R
e
a
l
-
t
i
me
mo
n
i
t
o
r
i
n
g
,
a
d
v
a
n
c
e
d
sea
r
c
h
B
r
a
n
d
mo
n
i
t
o
r
i
n
g
,
r
i
s
k
sco
r
i
n
g
Th
r
e
a
t
i
n
t
e
l
l
i
g
e
n
c
e
,
i
n
c
i
d
e
n
t
r
e
sp
o
n
se
R
e
a
l
-
t
i
me
mo
n
i
t
o
r
i
n
g
,
a
d
v
a
n
c
e
d
s
e
a
r
c
h
,
b
r
a
n
d
mo
n
i
t
o
r
i
n
g
,
t
h
r
e
a
t
i
n
t
e
l
l
i
g
e
n
c
e
,
o
f
f
e
n
s
i
v
e
s
e
c
u
r
i
t
y
I
n
t
e
g
r
a
t
i
o
n
o
p
t
i
o
n
s
I
n
t
e
g
r
a
t
i
o
n
w
i
t
h
S
I
EM
,
TI
P
,
S
O
A
R
I
n
t
e
g
r
a
t
i
o
n
w
i
t
h
S
I
EM
,
TI
P
I
n
t
e
g
r
a
t
i
o
n
w
i
t
h
S
I
EM
,
TI
P
I
n
t
e
g
r
a
t
i
o
n
w
i
t
h
S
I
EM
,
S
O
A
R
D
a
t
a
v
i
s
u
a
l
i
z
a
t
i
o
n
G
r
a
p
h
,
c
h
a
r
t
,
d
a
s
h
b
o
a
r
d
I
n
t
e
r
a
c
t
i
v
e
d
a
s
h
b
o
a
r
d
,
C
u
s
t
o
mi
z
a
b
l
e
r
e
p
o
r
t
V
i
su
a
l
i
z
a
t
i
o
n
s
,
r
e
l
a
t
i
o
n
s
h
i
p
ma
p
p
i
n
g
C
u
s
t
o
mi
z
a
b
l
e
d
a
sh
b
o
a
r
d
,
v
i
su
a
l
i
z
a
t
i
o
n
,
a
l
e
r
t
s,
n
o
t
i
f
i
c
a
t
i
o
n
s,
a
n
d
r
e
p
o
r
t
D
a
t
a
c
o
l
l
e
c
t
i
o
n
met
h
o
d
W
e
b
scra
p
p
i
n
g
,
A
P
I
i
n
t
e
g
r
a
t
i
o
n
s
W
e
b
c
r
a
w
l
i
n
g
a
n
d
d
a
t
a
scrap
p
i
n
g
W
e
b
c
r
a
w
l
i
n
g
,
O
S
I
N
T
c
o
l
l
e
c
t
i
o
n
D
a
t
a
scra
p
p
i
n
g
,
A
P
I
i
n
t
e
g
r
a
t
i
o
n
s,
w
e
b
c
r
a
w
l
i
n
g
S
u
b
s
c
r
i
p
t
i
o
n
S
u
b
s
c
r
i
p
t
i
o
n
-
b
a
se
d
S
u
b
s
c
r
i
p
t
i
o
n
-
b
a
se
d
Y
e
s,
C
u
s
t
o
m
p
r
i
c
i
n
g
N
o
,
O
p
e
n
S
o
u
r
c
e
5.
CO
NCLU
SI
O
N
I
n
c
o
n
clu
s
io
n
,
th
is
s
tu
d
y
c
o
n
tr
ib
u
tes
to
u
n
d
e
r
s
tan
d
in
g
h
o
w
cy
b
er
s
ec
u
r
ity
s
h
o
u
ld
in
teg
r
ate
b
r
a
n
d
m
o
n
ito
r
in
g
s
tr
ateg
ies
to
p
r
o
tect
b
r
an
d
r
ep
u
tatio
n
,
cu
s
to
m
er
d
ata,
an
d
th
e
p
r
o
p
o
s
ed
Data
B
r
ea
ch
Mo
n
ito
r
in
g
Fra
m
ewo
r
k
.
T
h
e
g
en
er
aliza
tio
n
s
d
er
iv
ed
f
r
o
m
th
e
r
esear
ch
f
in
d
in
g
s
u
n
d
er
s
co
r
e
th
e
p
iv
o
t
al
r
o
le
o
f
p
r
o
ac
tiv
e
cy
b
er
s
ec
u
r
ity
m
ea
s
u
r
es
in
m
it
ig
atin
g
d
ata
b
r
ea
ch
r
is
k
s
,
f
o
s
ter
in
g
b
r
an
d
tr
u
s
t,
an
d
m
ai
n
tain
in
g
a
s
tr
o
n
g
b
r
an
d
p
r
esen
ce
in
th
e
d
y
n
a
m
ic
d
ig
ita
l la
n
d
s
ca
p
e.
ACK
NO
WL
E
DG
M
E
N
T
S
T
h
e
au
th
o
r
s
wo
u
ld
lik
e
to
th
an
k
th
e
Sch
o
o
l
o
f
C
o
m
p
u
tin
g
Scien
ce
s
,
C
o
lleg
e
o
f
C
o
m
p
u
tin
g
,
I
n
f
o
r
m
atics
an
d
Ma
th
em
atics,
Un
iv
er
s
iti
T
ek
n
o
l
o
g
i
MA
R
A,
4
0
4
5
0
Sh
ah
Alam
,
Selan
g
o
r
,
Ma
lay
s
ia,
f
o
r
s
u
p
p
o
r
tin
g
th
e
p
u
b
licatio
n
o
f
t
h
is
p
ap
er
.
F
UNDING
I
NF
O
R
M
A
T
I
O
N
T
h
is
wo
r
k
is
f
u
n
d
ed
b
y
Un
iv
e
r
s
iti T
ek
n
o
lo
g
i M
AR
A,
4
0
4
5
0
Sh
ah
Alam
,
Ma
lay
s
ia.
AUTHO
R
CO
NT
RI
B
UT
I
O
NS ST
A
T
E
M
E
N
T
Sit
i
Ar
p
ah
Ah
m
ad
,
Mu
h
am
m
ad
Al’
I
m
r
an
Mo
h
d
Kh
air
u
d
d
in
,
an
d
No
r
Sh
ah
n
iza
Ka
m
al
B
ash
ah
co
n
ce
iv
ed
t
h
e
o
v
er
all
co
n
ce
p
t
o
f
th
e
r
esear
ch
a
n
d
th
e
m
eth
o
d
o
lo
g
y
.
Mu
h
am
m
a
d
Al'
I
m
r
an
Mo
h
d
Kh
air
u
d
d
in
d
ev
elo
p
e
d
th
e
DW
B
M
s
y
s
tem
,
ca
r
r
ied
o
u
t
th
e
in
v
esti
g
atio
n
,
a
n
d
co
n
d
u
cted
t
h
e
ex
p
e
r
im
en
ts
.
Sit
i
Ar
p
ah
Ah
m
ad
,
No
r
Sh
ah
n
iza
Kam
al
B
ash
ah
,
an
d
Nu
r
u
l
Ais
h
ah
Ab
R
am
an
v
er
if
ied
th
e
s
y
s
tem
an
d
th
e
r
esu
lts
.
Fo
r
m
al
an
aly
s
is
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
3
,
J
u
n
e
20
25
:
3
1
6
2
-
3
1
7
0
3168
is
d
o
n
e
b
y
Sit
i
Ar
p
ah
Ah
m
ad
an
d
No
r
Sh
ah
n
iza
Kam
al
B
ash
ah
.
Data
cu
r
atio
n
is
d
o
n
e
b
y
Sit
i
Ar
p
ah
Ah
m
ad
,
Mu
h
am
m
ad
Al’
I
m
r
a
n
Mo
h
d
Kh
air
u
d
d
in
,
an
d
No
r
Sh
a
h
n
iz
a
Kam
al
B
ash
ah
.
T
h
e
o
r
ig
in
a
l
d
r
af
t
was
d
o
n
e
b
y
Mu
h
am
m
ad
Al’
I
m
r
an
M
o
h
d
Kh
air
u
d
d
in
.
W
r
itin
g
,
r
ev
iewin
g
,
ed
itin
g
,
a
n
d
v
is
u
aliza
tio
n
a
r
e
d
o
n
e
b
y
Sit
i
Ar
p
ah
Ah
m
ad
,
No
r
Sh
ah
n
iza
Kam
al
B
ash
ah
,
an
d
Nu
r
u
l
Ais
h
ah
Ab
R
am
an
.
Su
p
er
v
is
io
n
is
d
o
n
e
b
y
Sit
i
Ar
p
ah
Ah
m
ad
.
P
r
o
ject
ad
m
in
is
tr
atio
n
is
done
by
Mu
h
am
m
a
d
Al’
I
m
r
an
Mo
h
d
Kh
air
u
d
d
i
n
.
All
au
th
o
r
s
d
i
s
cu
s
s
ed
th
e
r
esu
lts
an
d
co
n
tr
ib
u
ted
t
o
th
e
f
i
n
al
m
an
u
s
cr
ip
t.
Na
m
e
o
f
Aut
ho
r
C
M
So
Va
Fo
I
R
D
O
E
Vi
Su
P
Fu
Sit
i A
r
p
ah
Ah
m
ad
✓
✓
✓
✓
✓
✓
✓
✓
Mu
h
am
m
ad
Al’
I
m
r
an
Mo
h
d
Kh
air
u
d
d
in
✓
✓
✓
✓
✓
✓
✓
✓
✓
No
r
Sh
ah
n
iza
Kam
al
B
ash
ah
1
✓
✓
✓
✓
✓
✓
Nu
r
u
l A
is
h
ah
Ab
R
am
an
✓
✓
✓
C
:
C
o
n
c
e
p
t
u
a
l
i
z
a
t
i
o
n
M
:
M
e
t
h
o
d
o
l
o
g
y
So
:
So
f
t
w
a
r
e
Va
:
Va
l
i
d
a
t
i
o
n
Fo
:
Fo
r
mal
a
n
a
l
y
s
i
s
I
:
I
n
v
e
s
t
i
g
a
t
i
o
n
R
:
R
e
so
u
r
c
e
s
D
:
D
a
t
a
C
u
r
a
t
i
o
n
O
:
W
r
i
t
i
n
g
-
O
r
i
g
i
n
a
l
D
r
a
f
t
E
:
W
r
i
t
i
n
g
-
R
e
v
i
e
w
&
E
d
i
t
i
n
g
Vi
:
Vi
su
a
l
i
z
a
t
i
o
n
Su
:
Su
p
e
r
v
i
s
i
o
n
P
:
P
r
o
j
e
c
t
a
d
mi
n
i
st
r
a
t
i
o
n
Fu
:
Fu
n
d
i
n
g
a
c
q
u
i
si
t
i
o
n
CO
NF
L
I
C
T
O
F
I
N
T
E
R
E
S
T
ST
A
T
E
M
E
NT
Au
th
o
r
s
d
ec
lar
e
n
o
co
n
f
licts
o
f
in
ter
est
E
T
H
I
CAL AP
P
RO
V
AL
T
h
is
r
esear
ch
h
as
ap
p
lied
f
o
r
an
eth
ics
ex
em
p
tio
n
f
r
o
m
Un
i
v
er
s
iti
T
ek
n
o
lo
g
i
MA
R
A
an
d
h
as
b
ee
n
ap
p
r
o
v
ed
u
n
d
er
r
ef
er
e
n
ce
n
o
.
1
0
0
-
KPPIM
(
PI.
9
/1
0
/3
)
(
E
X/7
9
8
)
.
DATA AV
AI
L
AB
I
L
I
T
Y
Data
av
ailab
ilit
y
is
n
o
t
ap
p
lica
b
le
to
th
is
p
ap
er
as n
o
n
ew
d
at
a
wer
e
cr
ea
ted
o
r
an
aly
ze
d
in
t
h
is
s
tu
d
y
.
RE
F
E
R
E
NC
E
S
[
1
]
H
.
S
a
l
e
e
m
a
n
d
M
.
N
a
v
e
e
d
,
“
S
o
K
:
A
n
a
t
o
my
o
f
d
a
t
a
b
r
e
a
c
h
e
s,
”
i
n
Pr
o
c
e
e
d
i
n
g
s
o
n
Pr
i
v
a
c
y
E
n
h
a
n
c
i
n
g
T
e
c
h
n
o
l
o
g
i
e
s
,
v
o
l
.
2
0
2
0
,
n
o
.
4
,
p
p
.
1
5
3
–
1
7
4
,
O
c
t
.
2
0
2
0
,
d
o
i
:
1
0
.
2
4
7
8
/
p
o
p
e
t
s
-
2
0
2
0
-
0
0
6
7
.
[
2
]
J.
L
i
,
W
.
X
i
a
o
,
a
n
d
C
.
Z
h
a
n
g
,
“
D
a
t
a
sec
u
r
i
t
y
c
r
i
s
i
s
i
n
u
n
i
v
e
r
si
t
i
e
s
:
i
d
e
n
t
i
f
i
c
a
t
i
o
n
o
f
k
e
y
f
a
c
t
o
r
s
a
f
f
e
c
t
i
n
g
d
a
t
a
b
r
e
a
c
h
i
n
c
i
d
e
n
t
s
,
”
H
u
m
a
n
i
t
i
e
s
a
n
d
S
o
c
i
a
l
S
c
i
e
n
c
e
s
C
o
m
m
u
n
i
c
a
t
i
o
n
s
,
v
o
l
.
1
0
,
n
o
.
1
,
M
a
y
2
0
2
3
,
d
o
i
:
1
0
.
1
0
5
7
/
s
4
1
5
9
9
-
0
2
3
-
0
1
7
5
7
-
0.
[
3
]
S
.
C
h
a
t
t
e
r
j
e
e
,
X
.
G
a
o
,
S
.
S
a
r
k
a
r
,
a
n
d
C
.
U
z
ma
n
o
g
l
u
,
“
R
e
a
c
t
i
n
g
t
o
t
h
e
sc
o
p
e
o
f
a
d
a
t
a
b
r
e
a
c
h
:
T
h
e
d
i
f
f
e
r
e
n
t
i
a
l
r
o
l
e
o
f
f
e
a
r
a
n
d
a
n
g
e
r
,
”
J
o
u
rn
a
l
o
f
Bu
s
i
n
e
ss
Re
s
e
a
r
c
h
,
v
o
l
.
1
0
1
,
p
p
.
1
8
3
–
1
9
3
,
A
u
g
.
2
0
1
9
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
j
b
u
sr
e
s.
2
0
1
9
.
0
4
.
0
2
4
.
[
4
]
H
.
T
a
o
e
t
a
l
.
,
“
E
c
o
n
o
mi
c
p
e
r
s
p
e
c
t
i
v
e
a
n
a
l
y
si
s
o
f
p
r
o
t
e
c
t
i
n
g
b
i
g
d
a
t
a
s
e
c
u
r
i
t
y
a
n
d
p
r
i
v
a
c
y
,
”
F
u
t
u
re
G
e
n
e
r
a
t
i
o
n
C
o
m
p
u
t
e
r
S
y
st
e
m
s
,
v
o
l
.
9
8
,
p
p
.
6
6
0
–
6
7
1
,
S
e
p
.
2
0
1
9
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
f
u
t
u
r
e
.
2
0
1
9
.
0
3
.
0
4
2
.
[
5
]
D
.
G
i
b
s
o
n
a
n
d
C
.
H
a
r
f
i
e
l
d
,
“
A
m
p
l
i
f
y
i
n
g
v
i
c
t
i
m
v
u
l
n
e
r
a
b
i
l
i
t
y
:
U
n
a
n
t
i
c
i
p
a
t
e
d
h
a
r
m
a
n
d
c
o
n
s
e
q
u
e
n
c
e
i
n
d
a
t
a
b
r
e
a
c
h
n
o
t
i
f
i
c
a
t
i
o
n
p
o
l
i
c
y
,
”
I
n
t
e
rn
a
t
i
o
n
a
l
R
e
v
i
e
w
o
f
V
i
c
t
i
m
o
l
o
g
y
,
v
o
l
.
2
9
,
n
o
.
3
,
p
p
.
3
4
1
–
3
6
5
,
S
e
p
.
2
0
2
3
,
d
o
i
:
1
0
.
1
1
7
7
/
0
2
6
9
7
5
8
0
2
2
1
1
0
7
6
8
3
.
[
6
]
T.
J
.
H
o
l
t
a
n
d
A
.
M
.
B
o
ssl
e
r
,
T
h
e
p
a
l
g
ra
v
e
h
a
n
d
b
o
o
k
o
f
i
n
t
e
r
n
a
t
i
o
n
a
l
c
y
b
e
rc
ri
m
e
a
n
d
c
y
b
e
rd
e
v
i
a
n
c
e
.
C
h
a
m:
S
p
r
i
n
g
e
r
I
n
t
e
r
n
a
t
i
o
n
a
l
P
u
b
l
i
s
h
i
n
g
,
2
0
2
0
.
d
o
i
:
1
0
.
1
0
0
7
/
9
7
8
-
3
-
3
1
9
-
7
8
4
4
0
-
3.
[
7
]
S
.
K
a
u
r
a
n
d
S
.
R
a
n
d
h
a
w
a
,
“
D
a
r
k
w
e
b
:
A
w
e
b
o
f
c
r
i
m
e
s,
”
W
i
re
l
e
ss
Pe
rs
o
n
a
l
C
o
m
m
u
n
i
c
a
t
i
o
n
s
,
v
o
l
.
1
1
2
,
n
o
.
4
,
p
p
.
2
1
3
1
–
2
1
5
8
,
J
u
n
.
2
0
2
0
,
d
o
i
:
1
0
.
1
0
0
7
/
s1
1
2
7
7
-
0
2
0
-
0
7
1
4
3
-
2.
[
8
]
D
.
Y
a
d
a
v
,
B
.
B
h
u
s
h
a
n
,
a
n
d
S
.
S
a
x
e
n
a
,
“
Th
e
d
a
r
k
w
e
b
:
A
d
i
v
e
I
n
t
o
t
h
e
d
a
r
k
e
st
si
d
e
o
f
t
h
e
I
n
t
e
r
n
e
t
,
”
S
S
RN
El
e
c
t
r
o
n
i
c
J
o
u
rn
a
l
,
2
0
2
0
,
d
o
i
:
1
0
.
2
1
3
9
/
s
sr
n
.
3
5
9
8
9
0
2
.
[
9
]
F
.
T.
N
g
o
,
C
.
M
a
r
c
u
m,
a
n
d
S
.
B
e
l
sh
a
w
,
“
T
h
e
d
a
r
k
w
e
b
:
W
h
a
t
i
s
i
t
,
h
o
w
t
o
a
c
c
e
ss
i
t
,
a
n
d
w
h
y
w
e
n
e
e
d
t
o
s
t
u
d
y
i
t
,
”
J
o
u
rn
a
l
o
f
C
o
n
t
e
m
p
o
r
a
ry
C
ri
m
i
n
a
l
J
u
s
t
i
c
e
,
v
o
l
.
3
9
,
n
o
.
2
,
p
p
.
1
6
0
–
1
6
6
,
M
a
y
2
0
2
3
,
d
o
i
:
1
0
.
1
1
7
7
/
1
0
4
3
9
8
6
2
2
3
1
1
5
9
7
7
4
.
[
1
0
]
M
.
H
a
t
t
a
,
“
D
e
e
p
w
e
b
,
d
a
r
k
w
e
b
,
d
a
r
k
n
e
t
,
”
A
n
n
a
l
s
o
f
B
u
s
i
n
e
ss
Ad
m
i
n
i
st
r
a
t
i
v
e
S
c
i
e
n
c
e
,
v
o
l
.
1
9
,
n
o
.
6
,
p
p
.
2
7
7
–
2
9
2
,
D
e
c
.
2
0
2
0
,
d
o
i
:
1
0
.
7
8
8
0
/
a
b
a
s
.
0
2
0
0
9
0
8
a
.
[
1
1
]
A
.
S
.
B
e
s
h
i
r
i
a
n
d
A
.
S
u
s
u
r
i
,
“
D
a
r
k
w
e
b
a
n
d
i
t
s
i
m
p
a
c
t
i
n
o
n
l
i
n
e
a
n
o
n
y
m
i
t
y
a
n
d
p
r
i
v
a
c
y
:
a
c
r
i
t
i
c
a
l
a
n
a
l
y
s
i
s
a
n
d
r
e
v
i
e
w
,
”
J
o
u
rn
a
l
o
f
C
o
m
p
u
t
e
r
a
n
d
C
o
m
m
u
n
i
c
a
t
i
o
n
s
,
v
o
l
.
0
7
,
n
o
.
0
3
,
p
p
.
3
0
–
4
3
,
2
0
1
9
,
d
o
i
:
1
0
.
4
2
3
6
/
j
c
c
.
2
0
1
9
.
7
3
0
0
4
.
[
1
2
]
C
.
A
.
M
a
k
r
i
d
i
s
,
“
D
o
d
a
t
a
b
r
e
a
c
h
e
s
d
a
m
a
g
e
r
e
p
u
t
a
t
i
o
n
?
E
v
i
d
e
n
c
e
f
r
o
m
4
5
c
o
m
p
a
n
i
e
s
b
e
t
w
e
e
n
2
0
0
2
a
n
d
2
0
1
8
,
”
J
o
u
r
n
a
l
o
f
C
y
b
e
rs
e
c
u
ri
t
y
,
v
o
l
.
7
,
n
o
.
1
,
S
e
p
.
2
0
2
1
,
d
o
i
:
1
0
.
1
0
9
3
/
c
y
b
sec
/
t
y
a
b
0
2
1
.
[
1
3
]
F
.
N
.
H
o
,
N
.
H
o
-
D
a
c
,
a
n
d
J.
S
.
H
u
a
n
g
,
“
T
h
e
e
f
f
e
c
t
s
o
f
p
r
i
v
a
c
y
a
n
d
d
a
t
a
b
r
e
a
c
h
e
s
o
n
c
o
n
s
u
mers
’
o
n
l
i
n
e
se
l
f
-
d
i
s
c
l
o
s
u
r
e
,
p
r
o
t
e
c
t
i
o
n
b
e
h
a
v
i
o
r
,
a
n
d
mess
a
g
e
v
a
l
e
n
c
e
,
”
S
a
g
e
O
p
e
n
,
v
o
l
.
1
3
,
n
o
.
3
,
J
u
l
.
2
0
2
3
,
d
o
i
:
1
0
.
1
1
7
7
/
2
1
5
8
2
4
4
0
2
3
1
1
8
1
3
9
5
.
[
1
4
]
I
.
C
o
n
f
e
n
t
e
,
G
.
G
.
S
i
c
i
l
i
a
n
o
,
B
.
G
a
u
d
e
n
z
i
,
a
n
d
M
.
E
i
c
k
h
o
f
f
,
“
Ef
f
e
c
t
s
o
f
d
a
t
a
b
r
e
a
c
h
e
s
f
r
o
m
u
ser
-
g
e
n
e
r
a
t
e
d
c
o
n
t
e
n
t
:
A
c
o
r
p
o
r
a
t
e
r
e
p
u
t
a
t
i
o
n
a
n
a
l
y
si
s
,
”
Eu
r
o
p
e
a
n
M
a
n
a
g
e
m
e
n
t
J
o
u
rn
a
l
,
v
o
l
.
3
7
,
n
o
.
4
,
p
p
.
4
9
2
–
5
0
4
,
A
u
g
.
2
0
1
9
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
e
mj
.
2
0
1
9
.
0
1
.
0
0
7
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
A
n
in
teg
r
a
ted
fr
a
mewo
r
k
fo
r
d
a
ta
b
r
ea
c
h
o
n
th
e
d
a
r
k
w
eb
in
b
r
a
n
d
…
(
S
iti A
r
p
a
h
b
in
ti A
h
ma
d
)
3169
[
1
5
]
N
.
S
i
n
g
h
a
n
d
S
.
Tr
i
p
a
t
h
y
,
“
I
t
’
s
t
o
o
l
a
t
e
i
f
e
x
f
i
l
t
r
a
t
e
:
Ea
r
l
y
st
a
g
e
A
n
d
r
o
i
d
r
a
n
so
mw
a
r
e
d
e
t
e
c
t
i
o
n
,
”
C
o
m
p
u
t
e
rs
&
S
e
c
u
ri
t
y
,
v
o
l
.
1
4
1
,
Ju
n
.
2
0
2
4
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
c
o
se.
2
0
2
4
.
1
0
3
8
1
9
.
[
1
6
]
X
.
Z
h
a
n
g
,
M
.
M
.
Y
a
d
o
l
l
a
h
i
,
S
.
D
a
d
k
h
a
h
,
H
.
I
sah
,
D
.
P
.
Le
,
a
n
d
A
.
A
.
G
h
o
r
b
a
n
i
,
“
D
a
t
a
b
r
e
a
c
h
:
a
n
a
l
y
s
i
s,
c
o
u
n
t
e
r
mea
s
u
r
e
s
a
n
d
c
h
a
l
l
e
n
g
e
s,”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
I
n
f
o
rm
a
t
i
o
n
a
n
d
C
o
m
p
u
t
e
r
S
e
c
u
ri
t
y
,
v
o
l
.
1
9
,
n
o
.
3
/
4
,
p
p
.
4
0
2
–
4
4
2
,
2
0
2
2
,
d
o
i
:
1
0
.
1
5
0
4
/
I
J
I
C
S
.
2
0
2
2
.
1
2
7
1
6
9
.
[
1
7
]
H
.
H
a
m
m
o
u
c
h
i
,
O
.
C
h
e
r
q
i
,
G
.
M
e
z
z
o
u
r
,
M
.
G
h
o
g
h
o
,
a
n
d
M
.
E
l
K
o
u
t
b
i
,
“
D
i
g
g
i
n
g
d
e
e
p
e
r
i
n
t
o
d
a
t
a
b
r
e
a
c
h
e
s
:
A
n
e
x
p
l
o
r
a
t
o
r
y
d
a
t
a
a
n
a
l
y
s
i
s
o
f
h
a
c
k
i
n
g
b
r
e
a
c
h
e
s
o
v
e
r
t
i
m
e
,
”
P
r
o
c
e
d
i
a
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
,
v
o
l
.
1
5
1
,
p
p
.
1
0
0
4
–
1
0
0
9
,
2
0
1
9
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
p
r
o
c
s
.
2
0
1
9
.
0
4
.
1
4
1
.
[
1
8
]
I
.
H
.
S
a
r
k
e
r
,
“
M
a
c
h
i
n
e
l
e
a
r
n
i
n
g
f
o
r
i
n
t
e
l
l
i
g
e
n
t
d
a
t
a
a
n
a
l
y
s
i
s
a
n
d
a
u
t
o
mat
i
o
n
i
n
c
y
b
e
r
se
c
u
r
i
t
y
:
C
u
r
r
e
n
t
a
n
d
f
u
t
u
r
e
p
r
o
sp
e
c
t
s,”
A
n
n
a
l
s
o
f
D
a
t
a
S
c
i
e
n
c
e
,
v
o
l
.
1
0
,
n
o
.
6
,
p
p
.
1
4
7
3
–
1
4
9
8
,
D
e
c
.
2
0
2
3
,
d
o
i
:
1
0
.
1
0
0
7
/
s
4
0
7
4
5
-
022
-
0
0
4
4
4
-
2.
[
1
9
]
D
.
M
o
l
i
t
o
r
,
A
.
S
a
h
a
r
i
a
,
V
.
R
a
g
h
u
p
a
t
h
i
,
a
n
d
W
.
R
a
g
h
u
p
a
t
h
i
,
“
E
x
p
l
o
r
i
n
g
t
h
e
c
h
a
r
a
c
t
e
r
i
s
t
i
c
s o
f
d
a
t
a
b
r
e
a
c
h
e
s:
A
d
e
scri
p
t
i
v
e
a
n
a
l
y
t
i
c
st
u
d
y
,
”
J
o
u
r
n
a
l
o
f
I
n
f
o
rm
a
t
i
o
n
S
e
c
u
ri
t
y
,
v
o
l
.
1
5
,
n
o
.
0
2
,
p
p
.
1
6
8
–
1
9
5
,
2
0
2
4
,
d
o
i
:
1
0
.
4
2
3
6
/
j
i
s.
2
0
2
4
.
1
5
2
0
1
1
.
[
2
0
]
P
.
M
a
y
e
r
e
t
a
l
.
,
“
A
w
a
r
e
n
e
ss,
i
n
t
e
n
t
i
o
n
,
(
i
n
)
a
c
t
i
o
n
:
I
n
d
i
v
i
d
u
a
l
s’
r
e
a
c
t
i
o
n
s
t
o
d
a
t
a
b
r
e
a
c
h
e
s,
”
A
C
M
T
r
a
n
sa
c
t
i
o
n
s
o
n
C
o
m
p
u
t
e
r
-
H
u
m
a
n
I
n
t
e
r
a
c
t
i
o
n
,
v
o
l
.
3
0
,
n
o
.
5
,
p
p
.
1
–
5
3
,
O
c
t
.
2
0
2
3
,
d
o
i
:
1
0
.
1
1
4
5
/
3
5
8
9
9
5
8
.
[
2
1
]
H
.
Te
y
m
o
u
r
l
o
u
e
i
a
n
d
V
.
E.
H
a
r
r
i
s,
“
P
r
e
v
e
n
t
i
n
g
d
a
t
a
b
r
e
a
c
h
e
s
:
U
t
i
l
i
s
i
n
g
l
o
g
a
n
a
l
y
si
s
a
n
d
ma
c
h
i
n
e
l
e
a
r
n
i
n
g
f
o
r
i
n
si
d
e
r
a
t
t
a
c
k
d
e
t
e
c
t
i
o
n
,
”
i
n
2
0
2
2
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
C
o
m
p
u
t
a
t
i
o
n
a
l
S
c
i
e
n
c
e
a
n
d
C
o
m
p
u
t
a
t
i
o
n
a
l
I
n
t
e
l
l
i
g
e
n
c
e
(
C
S
C
I
)
,
2
0
2
2
,
p
p
.
1
0
2
3
–
1
0
2
8
.
[
2
2
]
Y
.
F
a
n
g
,
Y
.
G
u
o
,
C
.
H
u
a
n
g
,
a
n
d
L.
L
i
u
,
“
A
n
a
l
y
z
i
n
g
a
n
d
i
d
e
n
t
i
f
y
i
n
g
d
a
t
a
b
r
e
a
c
h
e
s
i
n
u
n
d
e
r
g
r
o
u
n
d
f
o
r
u
ms,
”
I
EE
E
Ac
c
e
ss
,
v
o
l
.
7
,
p
p
.
4
8
7
7
0
–
4
8
7
7
7
,
2
0
1
9
,
d
o
i
:
1
0
.
1
1
0
9
/
A
C
C
ESS
.
2
0
1
9
.
2
9
1
0
2
2
9
.
[
2
3
]
D
.
C
h
e
n
,
M
.
M
.
C
h
o
w
d
h
u
r
y
,
a
n
d
S
.
La
t
i
f
,
“
D
a
t
a
b
r
e
a
c
h
e
s
i
n
c
o
r
p
o
r
a
t
e
s
e
t
t
i
n
g
,
”
i
n
2
0
2
1
I
n
t
e
rn
a
t
i
o
n
a
l
C
o
n
f
e
r
e
n
c
e
o
n
El
e
c
t
r
i
c
a
l
,
C
o
m
p
u
t
e
r
,
C
o
m
m
u
n
i
c
a
t
i
o
n
s
a
n
d
Me
c
h
a
t
r
o
n
i
c
s
E
n
g
i
n
e
e
r
i
n
g
(
I
C
EC
C
ME
)
,
O
c
t
.
2
0
2
1
,
p
p
.
0
1
–
0
6
.
d
o
i
:
1
0
.
1
1
0
9
/
I
C
EC
C
M
E
5
2
2
0
0
.
2
0
2
1
.
9
5
9
0
9
7
4
.
[
2
4
]
S
.
Tr
a
b
e
l
s
i
,
“
M
o
n
i
t
o
r
i
n
g
l
e
a
k
e
d
c
o
n
f
i
d
e
n
t
i
a
l
d
a
t
a
,
”
i
n
2
0
1
9
1
0
t
h
I
FI
P
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
N
e
w
T
e
c
h
n
o
l
o
g
i
e
s,
Mo
b
i
l
i
t
y
a
n
d
S
e
c
u
r
i
t
y
(
N
T
MS
)
,
Ju
n
.
2
0
1
9
,
p
p
.
1
–
5
.
d
o
i
:
1
0
.
1
1
0
9
/
N
TM
S
.
2
0
1
9
.
8
7
6
3
8
1
1
.
[
2
5
]
Z.
M
o
h
a
mm
e
d
,
“
D
a
t
a
b
r
e
a
c
h
r
e
c
o
v
e
r
y
a
r
e
a
s:
a
n
e
x
p
l
o
r
a
t
i
o
n
o
f
o
r
g
a
n
i
z
a
t
i
o
n
’
s
r
e
c
o
v
e
r
y
s
t
r
a
t
e
g
i
e
s
f
o
r
s
u
r
v
i
v
i
n
g
d
a
t
a
b
r
e
a
c
h
e
s,”
O
rg
a
n
i
z
a
t
i
o
n
a
l
C
y
b
e
rs
e
c
u
ri
t
y
J
o
u
r
n
a
l
:
Pr
a
c
t
i
c
e
,
Pr
o
c
e
ss
a
n
d
P
e
o
p
l
e
,
v
o
l
.
2
,
n
o
.
1
,
p
p
.
4
1
–
5
9
,
A
p
r
.
2
0
2
2
,
d
o
i
:
1
0
.
1
1
0
8
/
O
C
J
-
05
-
2
0
2
1
-
0
0
1
4
.
[
2
6
]
M
.
R
.
U
d
d
i
n
,
S
.
A
k
t
e
r
,
a
n
d
W
.
J.
T.
Le
e
,
“
D
e
v
e
l
o
p
i
n
g
a
d
a
t
a
b
r
e
a
c
h
p
r
o
t
e
c
t
i
o
n
c
a
p
a
b
i
l
i
t
y
f
r
a
mew
o
r
k
i
n
r
e
t
a
i
l
i
n
g
,
”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
rn
a
l
o
f
Pro
d
u
c
t
i
o
n
Ec
o
n
o
m
i
c
s
,
v
o
l
.
2
7
1
,
M
a
y
2
0
2
4
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
i
j
p
e
.
2
0
2
4
.
1
0
9
2
0
2
.
[
2
7
]
H
.
Ta
h
e
r
d
o
o
s
t
,
“
U
n
d
e
r
st
a
n
d
i
n
g
c
y
b
e
r
sec
u
r
i
t
y
f
r
a
m
e
w
o
r
k
s
a
n
d
i
n
f
o
r
m
a
t
i
o
n
s
e
c
u
r
i
t
y
st
a
n
d
a
r
d
s
-
a
r
e
v
i
e
w
a
n
d
c
o
mp
r
e
h
e
n
s
i
v
e
o
v
e
r
v
i
e
w
,
”
E
l
e
c
t
r
o
n
i
c
s
,
v
o
l
.
1
1
,
n
o
.
1
4
,
J
u
l
.
2
0
2
2
,
d
o
i
:
1
0
.
3
3
9
0
/
e
l
e
c
t
r
o
n
i
c
s
1
1
1
4
2
1
8
1
.
[
2
8
]
H
.
A
l
n
a
b
u
l
si
a
n
d
R
.
I
sl
a
m,
“
I
d
e
n
t
i
f
i
c
a
t
i
o
n
o
f
i
l
l
e
g
a
l
f
o
r
u
m
a
c
t
i
v
i
t
i
e
s
i
n
si
d
e
t
h
e
d
a
r
k
n
e
t
,
”
i
n
2
0
1
8
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
Ma
c
h
i
n
e
L
e
a
r
n
i
n
g
a
n
d
D
a
t
a
En
g
i
n
e
e
r
i
n
g
(
i
C
MLD
E)
,
D
e
c
.
2
0
1
8
,
p
p
.
2
2
–
2
9
.
d
o
i
:
1
0
.
1
1
0
9
/
i
C
M
LD
E.
2
0
1
8
.
0
0
0
1
5
.
[
2
9
]
R
.
Li
g
g
e
t
t
,
J.
R
.
Le
e
,
A
.
L.
R
o
d
d
y
,
a
n
d
M
.
A
.
W
a
l
l
i
n
,
“
T
h
e
d
a
r
k
w
e
b
a
s
a
p
l
a
t
f
o
r
m
f
o
r
c
r
i
me
:
A
n
e
x
p
l
o
r
a
t
i
o
n
o
f
i
l
l
i
c
i
t
d
r
u
g
,
f
i
r
e
a
r
m,
C
S
A
M
,
a
n
d
c
y
b
e
r
c
r
i
me
m
a
r
k
e
t
s,
”
i
n
T
h
e
P
a
l
g
r
a
v
e
H
a
n
d
b
o
o
k
o
f
I
n
t
e
r
n
a
t
i
o
n
a
l
C
y
b
e
r
c
ri
m
e
a
n
d
C
y
b
e
rd
e
v
i
a
n
c
e
,
C
h
a
m:
S
p
r
i
n
g
e
r
I
n
t
e
r
n
a
t
i
o
n
a
l
P
u
b
l
i
s
h
i
n
g
,
2
0
2
0
,
p
p
.
9
1
–
1
1
6
.
d
o
i
:
1
0
.
1
0
0
7
/
9
7
8
-
3
-
3
1
9
-
7
8
4
4
0
-
3
_
1
7
.
[
3
0
]
R
.
D
i
o
u
f
,
E
.
N
.
S
a
r
r
,
O
.
S
a
l
l
,
B
.
B
i
r
r
e
g
a
h
,
M
.
B
o
u
s
s
o
,
a
n
d
S
.
N
.
M
b
a
y
e
,
“
W
e
b
s
c
r
a
p
i
n
g
:
S
t
a
t
e
-
of
-
t
h
e
-
a
r
t
a
n
d
a
r
e
a
s
o
f
a
p
p
l
i
c
a
t
i
o
n
,
”
i
n
2
0
1
9
I
E
E
E
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
r
e
n
c
e
o
n
B
i
g
D
a
t
a
(
B
i
g
D
a
t
a
)
,
D
e
c
.
2
0
1
9
,
p
p
.
6
0
4
0
–
6
0
4
2
.
d
o
i
:
1
0
.
1
1
0
9
/
B
i
g
D
a
t
a
4
7
0
9
0
.
2
0
1
9
.
9
0
0
5
5
9
4
.
[
3
1
]
R
.
N
a
i
k
a
n
d
M
.
N
.
G
a
o
n
k
a
r
,
“
D
a
t
a
l
e
a
k
a
g
e
d
e
t
e
c
t
i
o
n
i
n
c
l
o
u
d
u
s
i
n
g
w
a
t
e
r
ma
r
k
i
n
g
t
e
c
h
n
i
q
u
e
,
”
i
n
2
0
1
9
I
n
t
e
rn
a
t
i
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
C
o
m
p
u
t
e
r
C
o
m
m
u
n
i
c
a
t
i
o
n
a
n
d
I
n
f
o
r
m
a
t
i
c
s (I
C
C
C
I
)
,
Ja
n
.
2
0
1
9
,
p
p
.
1
–
6
.
d
o
i
:
1
0
.
1
1
0
9
/
I
C
C
C
I
.
2
0
1
9
.
8
8
2
1
8
9
4
.
[
3
2
]
R
.
Á
v
i
l
a
,
R
.
K
h
o
u
r
y
,
R
.
K
h
o
u
r
y
,
a
n
d
F
.
P
e
t
r
i
l
l
o
,
“
U
se
o
f
s
e
c
u
r
i
t
y
l
o
g
s
f
o
r
d
a
t
a
l
e
a
k
d
e
t
e
c
t
i
o
n
:
A
sy
s
t
e
m
a
t
i
c
l
i
t
e
r
a
t
u
r
e
r
e
v
i
e
w
,
”
S
e
c
u
r
i
t
y
a
n
d
C
o
m
m
u
n
i
c
a
t
i
o
n
N
e
t
w
o
r
k
s
,
v
o
l
.
2
0
2
1
,
p
p
.
1
–
2
9
,
M
a
r
.
2
0
2
1
,
d
o
i
:
1
0
.
1
1
5
5
/
2
0
2
1
/
6
6
1
5
8
9
9
.
[
3
3
]
F
.
L
i
n
e
t
a
l
.
,
“
L
i
n
k
i
n
g
p
e
r
s
o
n
a
l
l
y
i
d
e
n
t
i
f
i
a
b
l
e
i
n
f
o
r
ma
t
i
o
n
f
r
o
m
t
h
e
d
a
r
k
w
e
b
t
o
t
h
e
s
u
r
f
a
c
e
w
e
b
:
A
d
e
e
p
e
n
t
i
t
y
r
e
s
o
l
u
t
i
o
n
a
p
p
r
o
a
c
h
,
”
i
n
2
0
2
0
I
n
t
e
rn
a
t
i
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
D
a
t
a
M
i
n
i
n
g
Wo
r
k
s
h
o
p
s
(
I
C
D
MW
)
,
N
o
v
.
2
0
2
0
,
p
p
.
4
8
8
–
4
9
5
.
d
o
i
:
1
0
.
1
1
0
9
/
I
C
D
M
W
5
1
3
1
3
.
2
0
2
0
.
0
0
0
7
2
.
B
I
O
G
RAP
H
I
E
S O
F
AUTH
O
RS
S
iti
Ar
p
a
h
Ahm
a
d
h
a
s
re
c
e
iv
e
d
a
P
h
.
D.
i
n
e
lec
tri
c
a
l
e
n
g
i
n
e
e
rin
g
(
2
0
1
7
)
fro
m
Un
iv
e
rsiti
Tek
n
o
l
o
g
i
M
ARA
.
S
h
e
is
a
se
n
i
o
r
lec
tu
re
r
a
t
th
e
c
o
ll
e
g
e
o
f
c
o
m
p
u
t
in
g
,
in
f
o
rm
a
ti
c
s,
a
n
d
m
a
th
e
m
a
ti
c
s
a
t
Un
iv
e
rsiti
Te
k
n
o
lo
g
i
M
ARA
,
M
a
lay
sia
.
S
h
e
is
c
u
rre
n
tl
y
tea
c
h
in
g
c
o
m
p
u
ter
p
ro
jec
ts
f
o
r
d
e
g
re
e
stu
d
e
n
ts
in
th
e
c
o
m
p
u
ter
n
e
two
rk
in
g
d
e
g
re
e
a
n
d
t
h
e
c
y
b
e
rse
c
u
rit
y
a
n
d
d
i
g
it
a
l
fo
re
n
sic
s
m
a
ste
r’s
d
e
g
re
e
in
th
e
c
o
ll
e
g
e
o
f
c
o
m
p
u
ti
n
g
,
in
f
o
r
m
a
ti
c
s,
a
n
d
m
a
th
e
m
a
ti
c
s
a
t
Un
iv
e
rsiti
Tek
n
o
lo
g
i
M
ARA
,
M
a
lay
sia
.
He
r
c
u
rre
n
t
re
se
a
rc
h
in
tere
sts
a
re
in
c
y
b
e
rse
c
u
rit
y
se
c
u
rit
y
,
d
ig
it
a
l
f
o
re
n
sic
s,
ima
g
e
p
ro
c
e
ss
in
g
,
a
n
d
m
a
c
h
in
e
lea
rn
i
n
g
.
S
h
e
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
a
rp
a
h
3
4
0
@u
it
m
.
e
d
u
.
m
y
.
Mu
h
a
m
m
a
d
Al
Im
r
a
n
is a cy
b
e
rse
c
u
rit
y
a
n
d
d
ig
it
a
l
fo
re
n
sic
sp
e
c
ialist
k
n
o
wn
f
o
r
h
is
e
x
p
e
rti
se
i
n
th
e
field
.
He
g
r
a
d
u
a
ted
wi
th
a
d
e
g
re
e
i
n
in
f
o
r
m
a
ti
o
n
tec
h
n
o
lo
g
y
(n
e
tw
o
rk
tec
h
n
o
l
o
g
y
)
fr
o
m
Un
i
v
e
rsiti
Isla
m
S
e
lan
g
o
r
,
M
a
lay
sia
,
in
2
0
2
0
a
n
d
a
n
M
.
S
c
.
d
e
g
re
e
i
n
sc
ien
c
e
in
Cy
b
e
rse
c
u
rit
y
a
n
d
Dig
i
tal
F
o
re
n
sic
a
t
Un
iv
e
rsiti
Te
k
n
o
lo
g
i
M
AR
A,
M
a
lay
sia
in
2
0
2
3
.
Im
ra
n
'
s
p
ro
fe
ss
io
n
a
l
j
o
u
r
n
e
y
h
a
s
ta
k
e
n
h
i
m
to
Ne
tb
y
tes
e
c
,
w
h
e
re
h
e
se
rv
e
s
a
s
a
S
e
n
i
o
r
S
e
c
u
rit
y
An
a
l
y
st,
sp
e
c
ialisin
g
i
n
d
ig
i
tal
fo
re
n
sic
s
a
n
d
i
n
c
id
e
n
t
re
sp
o
n
se
.
His
wo
r
k
in
v
o
l
v
e
s
in
v
e
sti
g
a
ti
n
g
a
n
d
m
it
ig
a
ti
n
g
d
i
g
it
a
l
se
c
u
rit
y
b
re
a
c
h
e
s.
Im
ra
n
is
a
lso
a
d
e
d
ica
ted
re
s
e
a
r
c
h
e
r
with
a
fo
c
u
s
o
n
v
a
rio
u
s
c
y
b
e
r
se
c
u
rit
y
d
o
m
a
in
s
su
c
h
a
s
t
h
e
d
a
rk
we
b
,
c
re
d
e
n
ti
a
l
lea
k
a
g
e
,
fo
re
n
sic
tec
h
n
i
q
u
e
s,
S
I
EM
,
c
o
m
p
u
ter
fo
re
n
sic
a
n
a
ly
sis,
m
e
m
o
ry
f
o
re
n
sic
s,
d
e
tec
ti
o
n
a
n
a
ly
sis,
a
n
d
m
a
lwa
re
a
n
a
ly
sis.
He
a
c
ti
v
e
ly
c
o
n
tri
b
u
tes
t
o
t
h
e
c
y
b
e
rse
c
u
rit
y
c
o
m
m
u
n
it
y
a
n
d
c
a
n
b
e
re
a
c
h
e
d
a
t
imra
n
_
k
h
a
iru
d
d
i
n
@y
a
h
o
o
.
c
o
m
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
3
,
J
u
n
e
20
25
:
3
1
6
2
-
3
1
7
0
3170
No
r
S
h
a
h
n
iza
K
a
m
a
l
Ba
sh
a
h
h
o
l
d
s
a
P
h
.
D
d
e
g
re
e
in
Tele
m
a
ti
c
s
fro
m
No
rwe
g
ian
Un
iv
e
rsity
o
f
S
c
ien
c
e
a
n
d
Tec
h
n
o
lo
g
y
,
No
rwa
y
.
S
h
e
is
a
n
As
so
c
iat
e
P
ro
fe
ss
o
r
a
t
th
e
Co
ll
e
g
e
o
f
Co
m
p
u
ti
n
g
,
I
n
fo
rm
a
ti
c
s
a
n
d
M
a
th
e
m
a
ti
c
s,
Un
iv
e
rsiti
Te
k
n
o
lo
g
i
M
A
RA,
M
a
lay
sia
.
He
r
re
se
a
rc
h
in
tere
st
is
in
v
o
l
v
e
d
i
n
t
h
e
field
o
f
m
o
b
il
e
a
n
d
wire
les
s
c
o
m
m
u
n
ica
ti
o
n
a
n
d
se
m
a
n
ti
c
we
b
.
S
h
e
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
sh
a
h
n
i
z
a
@u
it
m
.
e
d
u
.
m
y
.
Nurul
Aisha
h
Ab
R
a
m
a
n
is
c
u
rre
n
tl
y
se
rv
in
g
a
s
a
n
a
c
a
d
e
m
ic
a
t
th
e
F
a
c
u
lt
y
o
f
Co
m
m
u
n
ica
ti
o
n
a
n
d
M
e
d
ia
S
t
u
d
ies
in
UiT
M
.
Ce
rti
fie
d
P
r
o
fe
ss
io
n
a
l
Tec
h
n
o
lo
g
ist
(Ts.
)
fr
o
m
M
a
lay
sia
n
B
o
a
rd
o
f
Tec
h
n
o
l
o
g
i
st
(M
BOT)
in
Arts
a
n
d
Cre
a
ti
v
e
M
u
l
ti
m
e
d
ia.
He
r
a
re
a
s
o
f
in
tere
st
a
re
p
o
li
ti
c
a
l
c
o
m
m
u
n
ica
ti
o
n
,
d
ig
i
tal
m
e
d
ia,
stra
teg
ic
c
o
m
m
u
n
ica
ti
o
n
,
a
n
d
in
ter
n
a
ti
o
n
a
l
re
latio
n
s
.
S
h
e
o
b
tain
e
d
h
e
r
M
A
in
stra
teg
ic
a
n
d
d
e
fe
n
se
stu
d
ies
fro
m
Un
iv
e
rsiti
M
a
lay
a
,
i
n
2
0
1
4
.
P
rio
r
to
jo
i
n
i
n
g
a
c
a
d
e
m
ia,
sh
e
wo
rk
e
d
a
t
M
e
d
ia
P
rima
Be
rh
a
d
a
t
t
h
e
Ne
ws
a
n
d
Cu
rre
n
t
Affa
irs
De
p
a
rtme
n
t
(NCA
)
a
s
b
ro
a
d
c
a
st
jo
u
r
n
a
li
st
sp
e
c
ializin
g
in
p
o
li
ti
c
a
l
a
n
d
g
o
v
e
rn
m
e
n
tal
issu
e
s.
S
h
e
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
a
ish
a
h
7
5
0
2
@u
it
m
.
e
d
u
.
m
y
.
Evaluation Warning : The document was created with Spire.PDF for Python.