IRM-1-WormInfection.pdf

IRM-2-WindowsIntrusion.pdf

IRM-3-UnixLinuxIntrusionDetection.pdf

IRM-4-DDOS.pdf

IRM-5-MaliciousNetworkBehaviour.pdf

IRM-6-Website-Defacement.pdf

IRM-7-WindowsMalwareDetection.pdf

IRM-8-Blackmail.pdf

IRM-9-SmartphoneMalware.pdf

IRM-10-SocialEngineering.pdf

IRM-11-InformationLeakage.pdf

IRM-12-Insiderabuse.pdf

IRM-13-Phishing.pdf

IRM-14-Scam.pdf

IRM-15-Trademark infringement.pdf

IRM-17-Ransomware.pdf