%PDF-1.6
%
1 0 obj
<>stream
application/pdfIEEE2016 IEEE Conference on Intelligence and Security Informatics (ISI);2016; ; ;10.1109/ISI.2016.7745467Shodan visualizedVincent J ErcolaniMark W PattonHsinchun Chen
2016 IEEE Conference on Intelligence and Security Informatics (ISI)193 Sept. 201610.1109/ISI.2016.7745467195
endstream
endobj
2 0 obj
<>
endobj
3 0 obj
<>
endobj
4 0 obj
<>
endobj
5 0 obj
<>stream
H\U t,A"ʚ%,}YVي"!lrX{X1(*TDdGe9 HK=Igw|YH7Iǖ=|$_ =@ycQ!i?fZ) rAnΈoZZ[p!S?~n?X}ƌO;@Z͙ZX3!0q9cs9;9^81ϫ 3s4h\mJQ?UʣJˈseڑVfC)>$tiꍐg/w lu20Nw*@W
`kßX'q ewqYL#0#%PHGXyD\e":IC!BLsl#}H;CKCa"u[kRmC먆ۨQ=)?C̐[@6L33ߍF[iɤ;06IKl\
#(StE@祆4.ur9Z:]08Q- kϑ[&^tZf`4*T2[h,~[b1K2ٯmRj<8$=H}ԓL=36y:#58qy$^S3 ]#JG+`dLx!Uez3t{-enщ{һ/.)m.&>FJzHɗŲBvy9<*BMPu>5-umRq_?'nAZ- ?TmU*IS+q'Kz_XV|Y
<Yݥ7EDb̒7d)eyV1byOv\r[+Ҭ(UkF:j*QꌮtjUЧ2&Ѵ3Mmylm-OO3Ogg#M;;{*EQʸwD1y4S%ދ0]hJ3QHmGnNWx>Hn<,-znZOݒX|)Ğ4l{PgF*eꠞg?]':u>sY%j%'}F"4cd߳SjSfiܓTW/ֲTL@,GdD6馞i*ҒQ!tshUKz{*K;#T1]$v`o2CMK&JrŶllG$Eumx7`kp*pdu;SaBS-Cm&ߋI-]Qg]LoVbM&ʔM-"FE`g=WX*/F;&}T &1«ܞɠpHQ&H)<>n+P
A>n;Z`ۆ5|)ng(JpJ^7gwHfh_ѫ[.C@ͥBPەp BC݇bB=[-2y*| D9:ĮO/CڵmӺU͛5m8)QB|ø1QzS7a!5kTVg<TcV4z4:D32b ǡ_+|Lgy&?Okv 4h߷KH{aNݽ^RaW T_dJ'ONrۂR)A L3Vip
Cmmh8/jpPg$pq,k* [bL?5ЕIh"
}NRnBhM)jۺQZ!@"@sgMۢ|>sϽ{=듂\0,5f?knl=>_TB=FIj PH.c:BS.λCdppM@^5ծQ|R|ɋBRor785ODs>0)x"Åͭ^%Ţzyawx)jc[bGS0i^`iipJD[