Return to Article Details Forensics of Network Attacks: Analysis of Techniques, Simulations and Program Solutions for Protection Download Download PDF