%PDF-1.7
%
1 0 obj
<>stream
application/pdfA Survey of Computational Intelligence Methods used in handling Man in the Middle Attacks in Machine to Machine CommunicationsSabitha Banu. A , G. Padmavathi
A-PDF Watermark 4.7.6 ; modified using iTextSharp 4.1.6 by 1T3XTijert
endstream
endobj
2 0 obj
<>/Lang(en-IN)/Pages 3 0 R/StructTreeRoot 4 0 R/Metadata 1 0 R/Type/Catalog>>
endobj
3 0 obj
<>
endobj
5 0 obj
<>/Font<>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Contents[38 0 R 39 0 R 40 0 R 41 0 R 42 0 R 43 0 R 44 0 R 45 0 R 46 0 R 47 0 R 48 0 R 49 0 R 50 0 R 51 0 R 52 0 R 53 0 R 54 0 R 55 0 R 56 0 R 57 0 R 58 0 R 59 0 R 60 0 R 61 0 R 62 0 R 63 0 R 64 0 R 65 0 R 66 0 R 67 0 R 68 0 R 69 0 R 70 0 R 71 0 R]/Group<>/Annots[72 0 R 73 0 R 74 0 R]/Type/Page/Tabs/S>>
endobj
49 0 obj
<>stream
x{91WnlY.V 췿}yvtwOOfEVͬ.괭f%r27 mP7iny,yr3*rni^m-6C^f
`F%Wg-pT?[Yn5vnuD2-ZzEM7;//x+{\urh}E2@}Z
g7Pimь&>L6*YrlHr4iN`h|4+?s 9j2
Y9e&q~~21R>˶Փ8fADZb=E9_/4 Ң]E-USt=>&f ek20u*i 0|7V̓>;$mEҠU?H]S}
ίO e$rrsSB LW&`r @gIݢH^6Bnq;D]l:B
dӥEo@S%@KbQ!j ESGdAX/a:JϢq)pڰt3iwxvu/^&h{OdZϫ4h+e֢@igʗidTb{ozO9ڏr~ӸRhuG0 D5"+`qMTmfv\%2/ϥ$nOp3ogu义 @w /9n/W= euhR?Zw7l+YU0,ػ5SƲTS҃U2[ۑ]LJVhwr=t4nТE"BCּLowp'B|IZ5I͘SWN,_Ib)[%hʋs8J?=D><ZbN'oLIr}PدFT\z8Vk@{/G<@g5"P[:ev).hʎg06qz#>8nG
Ձ|QBMvg5mlbNY9xO\*xsB}R ڙ*E5=(t1kJ; ϧx*A
_ =y/\A֗c[#褔TDgʵ/+z)P!ۈ]` B`;8f&
7Ѝ |߁!<=_#b8 )y>'ht4K9L:nQ
kDGQ=b";w
|(7@dHHhX3$ ?u̚wZ~P;rNn`b-f/h4RDbPpsق0WeϕlhRʶҗYL5(L]/ οNðD95lcʓ(K&v(tjKSkK!bPttM/tgL)4=4߄sS-2b@cjPx]HYÃS)Ka&{f^)fC?,^Gj}# >*=*n<5y~199O2
ͧcԊC \M$䕬U6i[>ٝZ#0q)uG- e3Hp J]cq0]Xs٘QK;#շ
y^N!#ƴC'ЏFCyZA}̿A[>BF2!Ȥ-@=LSnr}"U[8&80Kj>*^ЩL