file_rev_ef9a2dcb-1929-4011-83dd-62f7deab6a0b

Associated Releases

2015-11-30 Use of Network Forensic Mechanisms to Formulate Network Security
published | article-journal | CC-BY
doi:10.5281/zenodo.3839184

Public Access URLs

repository https://zenodo.org/record/3839184/files/Use%20of%20Network%20Forensic%20Mechanisms%20to%20Formulate%20Network%20Security.pdf
webarchive https://web.archive.org/web/20200523020937/https://zenodo.org/record/3839184/files/Use%20of%20Network%20Forensic%20Mechanisms%20to%20Formulate%20Network%20Security.pdf

Data Integrity Checksums

SHA-1 f51de724fed56711f1040412674e6158fad2333f
SHA-256 61cd97fd7b40a5c892687c87c147ac3fc044a979b106ae729a9e324c76dcfd86
MD5 27adb8ceee26259fe2e9102ac64c1379
Size  564.9 kB
MIME Type  application/pdf
Revision

This is a specific, static metadata record, not necessarily linked to any current entity in the catalog.

Catalog Record
Revision: ef9a2dcb-1929-4011-83dd-62f7deab6a0b
API URL: JSON