%PDF-1.7
%
1 0 obj
<>stream
application/pdfIntrusion Detection and Prevention Techniques for Dos Attack with Security PatternsBhavik S. Sarang , Hinal H. Patel , Kinjal M. Patel
A-PDF Watermark 4.7.6 ; modified using iTextSharp 4.1.6 by 1T3XTijert
endstream
endobj
2 0 obj
<>/Lang(en-IN)/Pages 3 0 R/StructTreeRoot 4 0 R/Metadata 1 0 R/Type/Catalog>>
endobj
3 0 obj
<>
endobj
5 0 obj
<>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Contents[29 0 R 30 0 R 31 0 R 32 0 R 33 0 R 34 0 R 35 0 R 36 0 R 37 0 R 38 0 R 39 0 R 40 0 R 41 0 R 42 0 R 43 0 R 44 0 R 45 0 R 46 0 R 47 0 R 48 0 R 49 0 R 50 0 R 51 0 R 52 0 R 53 0 R 54 0 R 55 0 R 56 0 R 57 0 R 58 0 R 59 0 R 60 0 R 61 0 R 62 0 R]/Group<>/Annots[63 0 R 64 0 R 65 0 R]/Type/Page/Tabs/S>>
endobj
40 0 obj
<>stream
x=]s7#eM3W)WvvK;9J(krDY`f JeS刜NݍFc_L/'Y]_6'UFgmyջϾ;p9yw>k2Ynq}-@ѭ] `:B/9
HO33]VH?}il\9uq #*A:u$YHPMRZ8?$7Uq!`u ʃkGqX@lDA$zl-#TW<;Cu8U1wS+`ceԕNwV4QET=}8GTh+Yc2e4N\[>D!d}: ZQqu]/KNռbGbu%4ܐ_L+=]mvvLJw~\qv&~fn_!4\h?[,7Geg-kxXsZJ;_19cZ5
_vWsT`l{tcߡ%TnNF1e@!wf wrc)&$ ;C;UݵLaEx1<uuw,f;T:jg>3Y-z+95&4NQ$FᚃއQ]~#>kdr+!
E| )[vKowx| hq(o}>~T,VVX?E+`nZX^ͬOkjQVn0"A-P4
lV=0ƕc
Pub?ꂻ^\Hֿvw7DbO-#˖INZmwD_op݂ebrRĥ(rF尃T 1bgLrQ~3GU=ޘ~ {nG%r,)m" uv9|olZ"W+ݦرW;V
n샎g#`Vx"cQxWvR ㅍϺ+EY=T΄Q}} #]QN_;}vGݒDp䩀[G2y "#*R?;itBeo,ܵNƭCJ9ū߱Pj]0MXG9U)m{Vdߣ\Z^n#:愍Z'p}5-|:!n.<۰ ?xpӂEVh{<,aR+cr9,9߸Pey-0w;*ǠEfeQn>X XPN^vV
0,<̞A|gO,%ߔg>'=GYCM
!yblaƋVx<ŸRDYL?Za4t )rPR=
tI(M9,#eMGୌgmAǬyF; -^D=M'XWHo/K_)9T-s#yRZcBBDf3 x;g>koqꯘc\<*9A1_B -,^ӌűZh】6o"-!VVh'
zuE15x}0<j(VqrAd9#oh!_;`7VwgNK_ vzb@IOG{ٓB><,jE`Fqҍ$o!3i@ԴQ!P~J&h
TK崙NU+s%,Lm4|smOZPNvK Cv
wӍw85W^xB&>3Φ^DŴ7eAA*K *sΣo7˙"qFW3~j-dWҽ0\b߿_"> >a9.ʠV,1,ű} f䲫kUX1hWKR)(7l$F2˲1`
֫{1'c8~e*`C@NΘ3v1<pue&rF: %
q]&,{hh9聐kdv
Zi-5&-~C+-QM{xx@{V;kj7?~6% @}ʴHTƢU[cqA}C*1hjW\u4QॽZ{ߣ[M^H7fps1 +;I]{ne
W07V@w*o0
\<7L.]2CK˾Gc +bR zf{zK˙"P.6pomJv]T&