id sid tid token lemma pos work_tsqcfpvhajcedozkby6jtihnzu 1 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 1 2 Establishment Establishment NNP work_tsqcfpvhajcedozkby6jtihnzu 1 3 and and CC work_tsqcfpvhajcedozkby6jtihnzu 1 4 Implementation Implementation NNP work_tsqcfpvhajcedozkby6jtihnzu 1 5 of of IN work_tsqcfpvhajcedozkby6jtihnzu 1 6 Information Information NNP work_tsqcfpvhajcedozkby6jtihnzu 1 7 Network Network NNP work_tsqcfpvhajcedozkby6jtihnzu 1 8 Security Security NNP work_tsqcfpvhajcedozkby6jtihnzu 1 9 Plan Plan NNP work_tsqcfpvhajcedozkby6jtihnzu 1 10 Wang Wang NNP work_tsqcfpvhajcedozkby6jtihnzu 1 11 Yuanyuan Yuanyuan NNP work_tsqcfpvhajcedozkby6jtihnzu 1 12 Ideological Ideological NNP work_tsqcfpvhajcedozkby6jtihnzu 1 13 and and CC work_tsqcfpvhajcedozkby6jtihnzu 1 14 Political Political NNP work_tsqcfpvhajcedozkby6jtihnzu 1 15 Department Department NNP work_tsqcfpvhajcedozkby6jtihnzu 1 16 Xi’an Xi’an NNP work_tsqcfpvhajcedozkby6jtihnzu 1 17 Peihua Peihua NNP work_tsqcfpvhajcedozkby6jtihnzu 1 18 University University NNP work_tsqcfpvhajcedozkby6jtihnzu 1 19 Xi’an Xi’an NNP work_tsqcfpvhajcedozkby6jtihnzu 1 20 , , , work_tsqcfpvhajcedozkby6jtihnzu 1 21 710125 710125 CD work_tsqcfpvhajcedozkby6jtihnzu 1 22 , , , work_tsqcfpvhajcedozkby6jtihnzu 1 23 China China NNP work_tsqcfpvhajcedozkby6jtihnzu 1 24 e e NN work_tsqcfpvhajcedozkby6jtihnzu 1 25 - - NN work_tsqcfpvhajcedozkby6jtihnzu 1 26 mail mail NN work_tsqcfpvhajcedozkby6jtihnzu 1 27 : : : work_tsqcfpvhajcedozkby6jtihnzu 1 28 64789178@qq.com 64789178@qq.com NNP work_tsqcfpvhajcedozkby6jtihnzu 1 29 Abstract Abstract NNP work_tsqcfpvhajcedozkby6jtihnzu 1 30 — — : work_tsqcfpvhajcedozkby6jtihnzu 1 31 This this DT work_tsqcfpvhajcedozkby6jtihnzu 1 32 paper paper NN work_tsqcfpvhajcedozkby6jtihnzu 1 33 explains explain VBZ work_tsqcfpvhajcedozkby6jtihnzu 1 34 the the DT work_tsqcfpvhajcedozkby6jtihnzu 1 35 idea idea NN work_tsqcfpvhajcedozkby6jtihnzu 1 36 of of IN work_tsqcfpvhajcedozkby6jtihnzu 1 37 information information NN work_tsqcfpvhajcedozkby6jtihnzu 1 38 security security NN work_tsqcfpvhajcedozkby6jtihnzu 1 39 and and CC work_tsqcfpvhajcedozkby6jtihnzu 1 40 discusses discuss VBZ work_tsqcfpvhajcedozkby6jtihnzu 1 41 the the DT work_tsqcfpvhajcedozkby6jtihnzu 1 42 establishment establishment NN work_tsqcfpvhajcedozkby6jtihnzu 1 43 of of IN work_tsqcfpvhajcedozkby6jtihnzu 1 44 the the DT work_tsqcfpvhajcedozkby6jtihnzu 1 45 security security NN work_tsqcfpvhajcedozkby6jtihnzu 1 46 system system NN work_tsqcfpvhajcedozkby6jtihnzu 1 47 of of IN work_tsqcfpvhajcedozkby6jtihnzu 1 48 information information NN work_tsqcfpvhajcedozkby6jtihnzu 1 49 network network NN work_tsqcfpvhajcedozkby6jtihnzu 1 50 . . . work_tsqcfpvhajcedozkby6jtihnzu 2 1 By by IN work_tsqcfpvhajcedozkby6jtihnzu 2 2 using use VBG work_tsqcfpvhajcedozkby6jtihnzu 2 3 the the DT work_tsqcfpvhajcedozkby6jtihnzu 2 4 information information NN work_tsqcfpvhajcedozkby6jtihnzu 2 5 system system NN work_tsqcfpvhajcedozkby6jtihnzu 2 6 security security NN work_tsqcfpvhajcedozkby6jtihnzu 2 7 engineering engineering NN work_tsqcfpvhajcedozkby6jtihnzu 2 8 method method NN work_tsqcfpvhajcedozkby6jtihnzu 2 9 , , , work_tsqcfpvhajcedozkby6jtihnzu 2 10 we -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 2 11 will will MD work_tsqcfpvhajcedozkby6jtihnzu 2 12 establish establish VB work_tsqcfpvhajcedozkby6jtihnzu 2 13 and and CC work_tsqcfpvhajcedozkby6jtihnzu 2 14 improve improve VB work_tsqcfpvhajcedozkby6jtihnzu 2 15 the the DT work_tsqcfpvhajcedozkby6jtihnzu 2 16 network network NN work_tsqcfpvhajcedozkby6jtihnzu 2 17 security security NN work_tsqcfpvhajcedozkby6jtihnzu 2 18 plan plan NN work_tsqcfpvhajcedozkby6jtihnzu 2 19 and and CC work_tsqcfpvhajcedozkby6jtihnzu 2 20 disaster disaster NN work_tsqcfpvhajcedozkby6jtihnzu 2 21 recovery recovery NN work_tsqcfpvhajcedozkby6jtihnzu 2 22 plan plan NN work_tsqcfpvhajcedozkby6jtihnzu 2 23 through through IN work_tsqcfpvhajcedozkby6jtihnzu 2 24 strict strict JJ work_tsqcfpvhajcedozkby6jtihnzu 2 25 organization organization NN work_tsqcfpvhajcedozkby6jtihnzu 2 26 and and CC work_tsqcfpvhajcedozkby6jtihnzu 2 27 management management NN work_tsqcfpvhajcedozkby6jtihnzu 2 28 , , , work_tsqcfpvhajcedozkby6jtihnzu 2 29 adequate adequate JJ work_tsqcfpvhajcedozkby6jtihnzu 2 30 financial financial JJ work_tsqcfpvhajcedozkby6jtihnzu 2 31 support support NN work_tsqcfpvhajcedozkby6jtihnzu 2 32 , , , work_tsqcfpvhajcedozkby6jtihnzu 2 33 strong strong JJ work_tsqcfpvhajcedozkby6jtihnzu 2 34 talent talent NN work_tsqcfpvhajcedozkby6jtihnzu 2 35 support support NN work_tsqcfpvhajcedozkby6jtihnzu 2 36 and and CC work_tsqcfpvhajcedozkby6jtihnzu 2 37 deep deep JJ work_tsqcfpvhajcedozkby6jtihnzu 2 38 technical technical JJ work_tsqcfpvhajcedozkby6jtihnzu 2 39 guarantee guarantee NN work_tsqcfpvhajcedozkby6jtihnzu 2 40 . . . work_tsqcfpvhajcedozkby6jtihnzu 3 1 This this DT work_tsqcfpvhajcedozkby6jtihnzu 3 2 paper paper NN work_tsqcfpvhajcedozkby6jtihnzu 3 3 puts put VBZ work_tsqcfpvhajcedozkby6jtihnzu 3 4 forward forward RB work_tsqcfpvhajcedozkby6jtihnzu 3 5 the the DT work_tsqcfpvhajcedozkby6jtihnzu 3 6 overall overall JJ work_tsqcfpvhajcedozkby6jtihnzu 3 7 strategic strategic JJ work_tsqcfpvhajcedozkby6jtihnzu 3 8 goal goal NN work_tsqcfpvhajcedozkby6jtihnzu 3 9 of of IN work_tsqcfpvhajcedozkby6jtihnzu 3 10 the the DT work_tsqcfpvhajcedozkby6jtihnzu 3 11 " " `` work_tsqcfpvhajcedozkby6jtihnzu 3 12 people people NNS work_tsqcfpvhajcedozkby6jtihnzu 3 13 - - HYPH work_tsqcfpvhajcedozkby6jtihnzu 3 14 oriented orient VBN work_tsqcfpvhajcedozkby6jtihnzu 3 15 , , , work_tsqcfpvhajcedozkby6jtihnzu 3 16 to to TO work_tsqcfpvhajcedozkby6jtihnzu 3 17 prevent prevent VB work_tsqcfpvhajcedozkby6jtihnzu 3 18 the the DT work_tsqcfpvhajcedozkby6jtihnzu 3 19 main main JJ work_tsqcfpvhajcedozkby6jtihnzu 3 20 " " `` work_tsqcfpvhajcedozkby6jtihnzu 3 21 network network NN work_tsqcfpvhajcedozkby6jtihnzu 3 22 security security NN work_tsqcfpvhajcedozkby6jtihnzu 3 23 and and CC work_tsqcfpvhajcedozkby6jtihnzu 3 24 the the DT work_tsqcfpvhajcedozkby6jtihnzu 3 25 overall overall JJ work_tsqcfpvhajcedozkby6jtihnzu 3 26 plan plan NN work_tsqcfpvhajcedozkby6jtihnzu 3 27 to to TO work_tsqcfpvhajcedozkby6jtihnzu 3 28 solve solve VB work_tsqcfpvhajcedozkby6jtihnzu 3 29 the the DT work_tsqcfpvhajcedozkby6jtihnzu 3 30 network network NN work_tsqcfpvhajcedozkby6jtihnzu 3 31 security security NN work_tsqcfpvhajcedozkby6jtihnzu 3 32 problems problem NNS work_tsqcfpvhajcedozkby6jtihnzu 3 33 . . . work_tsqcfpvhajcedozkby6jtihnzu 4 1 Keywords Keywords NNP work_tsqcfpvhajcedozkby6jtihnzu 4 2 - - HYPH work_tsqcfpvhajcedozkby6jtihnzu 4 3 Information Information NNP work_tsqcfpvhajcedozkby6jtihnzu 4 4 Security Security NNP work_tsqcfpvhajcedozkby6jtihnzu 4 5 ; ; : work_tsqcfpvhajcedozkby6jtihnzu 4 6 Network Network NNP work_tsqcfpvhajcedozkby6jtihnzu 4 7 Security Security NNP work_tsqcfpvhajcedozkby6jtihnzu 4 8 ; ; : work_tsqcfpvhajcedozkby6jtihnzu 4 9 Network Network NNP work_tsqcfpvhajcedozkby6jtihnzu 4 10 Security Security NNP work_tsqcfpvhajcedozkby6jtihnzu 4 11 Plan Plan NNP work_tsqcfpvhajcedozkby6jtihnzu 4 12 Information Information NNP work_tsqcfpvhajcedozkby6jtihnzu 4 13 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 4 14 the the DT work_tsqcfpvhajcedozkby6jtihnzu 4 15 main main JJ work_tsqcfpvhajcedozkby6jtihnzu 4 16 trend trend NN work_tsqcfpvhajcedozkby6jtihnzu 4 17 of of IN work_tsqcfpvhajcedozkby6jtihnzu 4 18 development development NN work_tsqcfpvhajcedozkby6jtihnzu 4 19 in in IN work_tsqcfpvhajcedozkby6jtihnzu 4 20 contemporary contemporary JJ work_tsqcfpvhajcedozkby6jtihnzu 4 21 society society NN work_tsqcfpvhajcedozkby6jtihnzu 4 22 . . . work_tsqcfpvhajcedozkby6jtihnzu 5 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 5 2 rapid rapid JJ work_tsqcfpvhajcedozkby6jtihnzu 5 3 development development NN work_tsqcfpvhajcedozkby6jtihnzu 5 4 of of IN work_tsqcfpvhajcedozkby6jtihnzu 5 5 information information NN work_tsqcfpvhajcedozkby6jtihnzu 5 6 has have VBZ work_tsqcfpvhajcedozkby6jtihnzu 5 7 a a DT work_tsqcfpvhajcedozkby6jtihnzu 5 8 great great JJ work_tsqcfpvhajcedozkby6jtihnzu 5 9 impact impact NN work_tsqcfpvhajcedozkby6jtihnzu 5 10 on on IN work_tsqcfpvhajcedozkby6jtihnzu 5 11 all all DT work_tsqcfpvhajcedozkby6jtihnzu 5 12 aspects aspect NNS work_tsqcfpvhajcedozkby6jtihnzu 5 13 of of IN work_tsqcfpvhajcedozkby6jtihnzu 5 14 the the DT work_tsqcfpvhajcedozkby6jtihnzu 5 15 state state NN work_tsqcfpvhajcedozkby6jtihnzu 5 16 and and CC work_tsqcfpvhajcedozkby6jtihnzu 5 17 society society NN work_tsqcfpvhajcedozkby6jtihnzu 5 18 . . . work_tsqcfpvhajcedozkby6jtihnzu 6 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 6 2 information information NN work_tsqcfpvhajcedozkby6jtihnzu 6 3 network network NN work_tsqcfpvhajcedozkby6jtihnzu 6 4 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 6 5 the the DT work_tsqcfpvhajcedozkby6jtihnzu 6 6 nervous nervous JJ work_tsqcfpvhajcedozkby6jtihnzu 6 7 system system NN work_tsqcfpvhajcedozkby6jtihnzu 6 8 of of IN work_tsqcfpvhajcedozkby6jtihnzu 6 9 the the DT work_tsqcfpvhajcedozkby6jtihnzu 6 10 information information NN work_tsqcfpvhajcedozkby6jtihnzu 6 11 society society NN work_tsqcfpvhajcedozkby6jtihnzu 6 12 . . . work_tsqcfpvhajcedozkby6jtihnzu 7 1 As as IN work_tsqcfpvhajcedozkby6jtihnzu 7 2 the the DT work_tsqcfpvhajcedozkby6jtihnzu 7 3 main main JJ work_tsqcfpvhajcedozkby6jtihnzu 7 4 infrastructure infrastructure NN work_tsqcfpvhajcedozkby6jtihnzu 7 5 of of IN work_tsqcfpvhajcedozkby6jtihnzu 7 6 information information NN work_tsqcfpvhajcedozkby6jtihnzu 7 7 communication communication NN work_tsqcfpvhajcedozkby6jtihnzu 7 8 , , , work_tsqcfpvhajcedozkby6jtihnzu 7 9 the the DT work_tsqcfpvhajcedozkby6jtihnzu 7 10 security security NN work_tsqcfpvhajcedozkby6jtihnzu 7 11 problem problem NN work_tsqcfpvhajcedozkby6jtihnzu 7 12 has have VBZ work_tsqcfpvhajcedozkby6jtihnzu 7 13 become become VBN work_tsqcfpvhajcedozkby6jtihnzu 7 14 a a DT work_tsqcfpvhajcedozkby6jtihnzu 7 15 new new JJ work_tsqcfpvhajcedozkby6jtihnzu 7 16 security security NN work_tsqcfpvhajcedozkby6jtihnzu 7 17 research research NN work_tsqcfpvhajcedozkby6jtihnzu 7 18 hotspot hotspot NN work_tsqcfpvhajcedozkby6jtihnzu 7 19 . . . work_tsqcfpvhajcedozkby6jtihnzu 8 1 At at IN work_tsqcfpvhajcedozkby6jtihnzu 8 2 present present NN work_tsqcfpvhajcedozkby6jtihnzu 8 3 , , , work_tsqcfpvhajcedozkby6jtihnzu 8 4 the the DT work_tsqcfpvhajcedozkby6jtihnzu 8 5 threat threat NN work_tsqcfpvhajcedozkby6jtihnzu 8 6 control control NN work_tsqcfpvhajcedozkby6jtihnzu 8 7 of of IN work_tsqcfpvhajcedozkby6jtihnzu 8 8 network network NN work_tsqcfpvhajcedozkby6jtihnzu 8 9 security security NN work_tsqcfpvhajcedozkby6jtihnzu 8 10 has have VBZ work_tsqcfpvhajcedozkby6jtihnzu 8 11 been be VBN work_tsqcfpvhajcedozkby6jtihnzu 8 12 extended extend VBN work_tsqcfpvhajcedozkby6jtihnzu 8 13 from from IN work_tsqcfpvhajcedozkby6jtihnzu 8 14 the the DT work_tsqcfpvhajcedozkby6jtihnzu 8 15 technical technical JJ work_tsqcfpvhajcedozkby6jtihnzu 8 16 level level NN work_tsqcfpvhajcedozkby6jtihnzu 8 17 to to IN work_tsqcfpvhajcedozkby6jtihnzu 8 18 the the DT work_tsqcfpvhajcedozkby6jtihnzu 8 19 management management NN work_tsqcfpvhajcedozkby6jtihnzu 8 20 level level NN work_tsqcfpvhajcedozkby6jtihnzu 8 21 to to IN work_tsqcfpvhajcedozkby6jtihnzu 8 22 a a DT work_tsqcfpvhajcedozkby6jtihnzu 8 23 great great JJ work_tsqcfpvhajcedozkby6jtihnzu 8 24 extent extent NN work_tsqcfpvhajcedozkby6jtihnzu 8 25 . . . work_tsqcfpvhajcedozkby6jtihnzu 9 1 I. I. NNP work_tsqcfpvhajcedozkby6jtihnzu 10 1 AN an DT work_tsqcfpvhajcedozkby6jtihnzu 10 2 OVERVIEW OVERVIEW NNP work_tsqcfpvhajcedozkby6jtihnzu 10 3 OF of IN work_tsqcfpvhajcedozkby6jtihnzu 10 4 INFORMATION INFORMATION NNP work_tsqcfpvhajcedozkby6jtihnzu 10 5 NETWORK NETWORK NNP work_tsqcfpvhajcedozkby6jtihnzu 10 6 SECURITY SECURITY NNP work_tsqcfpvhajcedozkby6jtihnzu 10 7 A. a. NN work_tsqcfpvhajcedozkby6jtihnzu 11 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 11 2 Concept Concept NNP work_tsqcfpvhajcedozkby6jtihnzu 11 3 of of IN work_tsqcfpvhajcedozkby6jtihnzu 11 4 Information Information NNP work_tsqcfpvhajcedozkby6jtihnzu 11 5 Network Network NNP work_tsqcfpvhajcedozkby6jtihnzu 11 6 Security Security NNP work_tsqcfpvhajcedozkby6jtihnzu 11 7 and and CC work_tsqcfpvhajcedozkby6jtihnzu 11 8 The the DT work_tsqcfpvhajcedozkby6jtihnzu 11 9 Idea idea NN work_tsqcfpvhajcedozkby6jtihnzu 11 10 of of IN work_tsqcfpvhajcedozkby6jtihnzu 11 11 Information Information NNP work_tsqcfpvhajcedozkby6jtihnzu 11 12 Security Security NNP work_tsqcfpvhajcedozkby6jtihnzu 11 13 Information Information NNP work_tsqcfpvhajcedozkby6jtihnzu 11 14 network network NN work_tsqcfpvhajcedozkby6jtihnzu 11 15 security security NN work_tsqcfpvhajcedozkby6jtihnzu 11 16 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 11 17 a a DT work_tsqcfpvhajcedozkby6jtihnzu 11 18 security security NN work_tsqcfpvhajcedozkby6jtihnzu 11 19 protection protection NN work_tsqcfpvhajcedozkby6jtihnzu 11 20 to to TO work_tsqcfpvhajcedozkby6jtihnzu 11 21 prevent prevent VB work_tsqcfpvhajcedozkby6jtihnzu 11 22 accidents accident NNS work_tsqcfpvhajcedozkby6jtihnzu 11 23 and and CC work_tsqcfpvhajcedozkby6jtihnzu 11 24 malicious malicious JJ work_tsqcfpvhajcedozkby6jtihnzu 11 25 attacks attack NNS work_tsqcfpvhajcedozkby6jtihnzu 11 26 from from IN work_tsqcfpvhajcedozkby6jtihnzu 11 27 the the DT work_tsqcfpvhajcedozkby6jtihnzu 11 28 confidentiality confidentiality NN work_tsqcfpvhajcedozkby6jtihnzu 11 29 , , , work_tsqcfpvhajcedozkby6jtihnzu 11 30 integrity integrity NN work_tsqcfpvhajcedozkby6jtihnzu 11 31 , , , work_tsqcfpvhajcedozkby6jtihnzu 11 32 availability availability NN work_tsqcfpvhajcedozkby6jtihnzu 11 33 , , , work_tsqcfpvhajcedozkby6jtihnzu 11 34 controllability controllability NN work_tsqcfpvhajcedozkby6jtihnzu 11 35 and and CC work_tsqcfpvhajcedozkby6jtihnzu 11 36 non non JJ work_tsqcfpvhajcedozkby6jtihnzu 11 37 - - NN work_tsqcfpvhajcedozkby6jtihnzu 11 38 repudiation repudiation NN work_tsqcfpvhajcedozkby6jtihnzu 11 39 of of IN work_tsqcfpvhajcedozkby6jtihnzu 11 40 information information NN work_tsqcfpvhajcedozkby6jtihnzu 11 41 itself -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 11 42 and and CC work_tsqcfpvhajcedozkby6jtihnzu 11 43 information information NN work_tsqcfpvhajcedozkby6jtihnzu 11 44 system system NN work_tsqcfpvhajcedozkby6jtihnzu 11 45 ( ( -LRB- work_tsqcfpvhajcedozkby6jtihnzu 11 46 network network NN work_tsqcfpvhajcedozkby6jtihnzu 11 47 structure structure NN work_tsqcfpvhajcedozkby6jtihnzu 11 48 , , , work_tsqcfpvhajcedozkby6jtihnzu 11 49 application application NN work_tsqcfpvhajcedozkby6jtihnzu 11 50 services service NNS work_tsqcfpvhajcedozkby6jtihnzu 11 51 , , , work_tsqcfpvhajcedozkby6jtihnzu 11 52 etc etc FW work_tsqcfpvhajcedozkby6jtihnzu 11 53 . . . work_tsqcfpvhajcedozkby6jtihnzu 11 54 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 11 55 . . . work_tsqcfpvhajcedozkby6jtihnzu 12 1 Information information NN work_tsqcfpvhajcedozkby6jtihnzu 12 2 network network NN work_tsqcfpvhajcedozkby6jtihnzu 12 3 security security NN work_tsqcfpvhajcedozkby6jtihnzu 12 4 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 12 5 based base VBN work_tsqcfpvhajcedozkby6jtihnzu 12 6 on on IN work_tsqcfpvhajcedozkby6jtihnzu 12 7 the the DT work_tsqcfpvhajcedozkby6jtihnzu 12 8 physical physical JJ work_tsqcfpvhajcedozkby6jtihnzu 12 9 layer layer NN work_tsqcfpvhajcedozkby6jtihnzu 12 10 and and CC work_tsqcfpvhajcedozkby6jtihnzu 12 11 operation operation NN work_tsqcfpvhajcedozkby6jtihnzu 12 12 level level NN work_tsqcfpvhajcedozkby6jtihnzu 12 13 of of IN work_tsqcfpvhajcedozkby6jtihnzu 12 14 information information NN work_tsqcfpvhajcedozkby6jtihnzu 12 15 network network NN work_tsqcfpvhajcedozkby6jtihnzu 12 16 system system NN work_tsqcfpvhajcedozkby6jtihnzu 12 17 , , , work_tsqcfpvhajcedozkby6jtihnzu 12 18 as as RB work_tsqcfpvhajcedozkby6jtihnzu 12 19 well well RB work_tsqcfpvhajcedozkby6jtihnzu 12 20 as as IN work_tsqcfpvhajcedozkby6jtihnzu 12 21 the the DT work_tsqcfpvhajcedozkby6jtihnzu 12 22 protection protection NN work_tsqcfpvhajcedozkby6jtihnzu 12 23 of of IN work_tsqcfpvhajcedozkby6jtihnzu 12 24 information information NN work_tsqcfpvhajcedozkby6jtihnzu 12 25 itself -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 12 26 ( ( -LRB- work_tsqcfpvhajcedozkby6jtihnzu 12 27 data data NN work_tsqcfpvhajcedozkby6jtihnzu 12 28 layer layer NN work_tsqcfpvhajcedozkby6jtihnzu 12 29 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 12 30 and and CC work_tsqcfpvhajcedozkby6jtihnzu 12 31 the the DT work_tsqcfpvhajcedozkby6jtihnzu 12 32 level level NN work_tsqcfpvhajcedozkby6jtihnzu 12 33 of of IN work_tsqcfpvhajcedozkby6jtihnzu 12 34 attack attack NN work_tsqcfpvhajcedozkby6jtihnzu 12 35 ( ( -LRB- work_tsqcfpvhajcedozkby6jtihnzu 12 36 content content NN work_tsqcfpvhajcedozkby6jtihnzu 12 37 level level NN work_tsqcfpvhajcedozkby6jtihnzu 12 38 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 12 39 . . . work_tsqcfpvhajcedozkby6jtihnzu 13 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 13 2 definition definition NN work_tsqcfpvhajcedozkby6jtihnzu 13 3 of of IN work_tsqcfpvhajcedozkby6jtihnzu 13 4 the the DT work_tsqcfpvhajcedozkby6jtihnzu 13 5 definition definition NN work_tsqcfpvhajcedozkby6jtihnzu 13 6 of of IN work_tsqcfpvhajcedozkby6jtihnzu 13 7 network network NN work_tsqcfpvhajcedozkby6jtihnzu 13 8 security security NN work_tsqcfpvhajcedozkby6jtihnzu 13 9 at at IN work_tsqcfpvhajcedozkby6jtihnzu 13 10 the the DT work_tsqcfpvhajcedozkby6jtihnzu 13 11 technical technical JJ work_tsqcfpvhajcedozkby6jtihnzu 13 12 level level NN work_tsqcfpvhajcedozkby6jtihnzu 13 13 has have VBZ work_tsqcfpvhajcedozkby6jtihnzu 13 14 been be VBN work_tsqcfpvhajcedozkby6jtihnzu 13 15 relatively relatively RB work_tsqcfpvhajcedozkby6jtihnzu 13 16 complete complete JJ work_tsqcfpvhajcedozkby6jtihnzu 13 17 . . . work_tsqcfpvhajcedozkby6jtihnzu 14 1 But but CC work_tsqcfpvhajcedozkby6jtihnzu 14 2 the the DT work_tsqcfpvhajcedozkby6jtihnzu 14 3 security security NN work_tsqcfpvhajcedozkby6jtihnzu 14 4 of of IN work_tsqcfpvhajcedozkby6jtihnzu 14 5 information information NN work_tsqcfpvhajcedozkby6jtihnzu 14 6 network network NN work_tsqcfpvhajcedozkby6jtihnzu 14 7 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 14 8 a a DT work_tsqcfpvhajcedozkby6jtihnzu 14 9 multi multi JJ work_tsqcfpvhajcedozkby6jtihnzu 14 10 - - JJ work_tsqcfpvhajcedozkby6jtihnzu 14 11 dimensional dimensional JJ work_tsqcfpvhajcedozkby6jtihnzu 14 12 , , , work_tsqcfpvhajcedozkby6jtihnzu 14 13 multi multi JJ work_tsqcfpvhajcedozkby6jtihnzu 14 14 factor factor NN work_tsqcfpvhajcedozkby6jtihnzu 14 15 and and CC work_tsqcfpvhajcedozkby6jtihnzu 14 16 multi multi JJ work_tsqcfpvhajcedozkby6jtihnzu 14 17 - - JJ work_tsqcfpvhajcedozkby6jtihnzu 14 18 objective objective JJ work_tsqcfpvhajcedozkby6jtihnzu 14 19 system system NN work_tsqcfpvhajcedozkby6jtihnzu 14 20 . . . work_tsqcfpvhajcedozkby6jtihnzu 15 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 15 2 establishment establishment NN work_tsqcfpvhajcedozkby6jtihnzu 15 3 of of IN work_tsqcfpvhajcedozkby6jtihnzu 15 4 a a DT work_tsqcfpvhajcedozkby6jtihnzu 15 5 security security NN work_tsqcfpvhajcedozkby6jtihnzu 15 6 system system NN work_tsqcfpvhajcedozkby6jtihnzu 15 7 can can MD work_tsqcfpvhajcedozkby6jtihnzu 15 8 not not RB work_tsqcfpvhajcedozkby6jtihnzu 15 9 rely rely VB work_tsqcfpvhajcedozkby6jtihnzu 15 10 solely solely RB work_tsqcfpvhajcedozkby6jtihnzu 15 11 on on IN work_tsqcfpvhajcedozkby6jtihnzu 15 12 a a DT work_tsqcfpvhajcedozkby6jtihnzu 15 13 single single JJ work_tsqcfpvhajcedozkby6jtihnzu 15 14 security security NN work_tsqcfpvhajcedozkby6jtihnzu 15 15 mechanism mechanism NN work_tsqcfpvhajcedozkby6jtihnzu 15 16 and and CC work_tsqcfpvhajcedozkby6jtihnzu 15 17 a a DT work_tsqcfpvhajcedozkby6jtihnzu 15 18 variety variety NN work_tsqcfpvhajcedozkby6jtihnzu 15 19 of of IN work_tsqcfpvhajcedozkby6jtihnzu 15 20 security security NN work_tsqcfpvhajcedozkby6jtihnzu 15 21 services service NNS work_tsqcfpvhajcedozkby6jtihnzu 15 22 . . . work_tsqcfpvhajcedozkby6jtihnzu 16 1 Access access NN work_tsqcfpvhajcedozkby6jtihnzu 16 2 to to IN work_tsqcfpvhajcedozkby6jtihnzu 16 3 the the DT work_tsqcfpvhajcedozkby6jtihnzu 16 4 security security NN work_tsqcfpvhajcedozkby6jtihnzu 16 5 of of IN work_tsqcfpvhajcedozkby6jtihnzu 16 6 the the DT work_tsqcfpvhajcedozkby6jtihnzu 16 7 entire entire JJ work_tsqcfpvhajcedozkby6jtihnzu 16 8 information information NN work_tsqcfpvhajcedozkby6jtihnzu 16 9 network network NN work_tsqcfpvhajcedozkby6jtihnzu 16 10 system system NN work_tsqcfpvhajcedozkby6jtihnzu 16 11 depends depend VBZ work_tsqcfpvhajcedozkby6jtihnzu 16 12 on on IN work_tsqcfpvhajcedozkby6jtihnzu 16 13 the the DT work_tsqcfpvhajcedozkby6jtihnzu 16 14 combination combination NN work_tsqcfpvhajcedozkby6jtihnzu 16 15 of of IN work_tsqcfpvhajcedozkby6jtihnzu 16 16 multiple multiple JJ work_tsqcfpvhajcedozkby6jtihnzu 16 17 security security NN work_tsqcfpvhajcedozkby6jtihnzu 16 18 mechanisms mechanism NNS work_tsqcfpvhajcedozkby6jtihnzu 16 19 and and CC work_tsqcfpvhajcedozkby6jtihnzu 16 20 a a DT work_tsqcfpvhajcedozkby6jtihnzu 16 21 variety variety NN work_tsqcfpvhajcedozkby6jtihnzu 16 22 of of IN work_tsqcfpvhajcedozkby6jtihnzu 16 23 security security NN work_tsqcfpvhajcedozkby6jtihnzu 16 24 services service NNS work_tsqcfpvhajcedozkby6jtihnzu 16 25 . . . work_tsqcfpvhajcedozkby6jtihnzu 17 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 17 2 concept concept NN work_tsqcfpvhajcedozkby6jtihnzu 17 3 of of IN work_tsqcfpvhajcedozkby6jtihnzu 17 4 information information NN work_tsqcfpvhajcedozkby6jtihnzu 17 5 security security NN work_tsqcfpvhajcedozkby6jtihnzu 17 6 , , , work_tsqcfpvhajcedozkby6jtihnzu 17 7 which which WDT work_tsqcfpvhajcedozkby6jtihnzu 17 8 was be VBD work_tsqcfpvhajcedozkby6jtihnzu 17 9 produced produce VBN work_tsqcfpvhajcedozkby6jtihnzu 17 10 in in IN work_tsqcfpvhajcedozkby6jtihnzu 17 11 1990s 1990s CD work_tsqcfpvhajcedozkby6jtihnzu 17 12 , , , work_tsqcfpvhajcedozkby6jtihnzu 17 13 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 17 14 the the DT work_tsqcfpvhajcedozkby6jtihnzu 17 15 result result NN work_tsqcfpvhajcedozkby6jtihnzu 17 16 of of IN work_tsqcfpvhajcedozkby6jtihnzu 17 17 this this DT work_tsqcfpvhajcedozkby6jtihnzu 17 18 idea idea NN work_tsqcfpvhajcedozkby6jtihnzu 17 19 . . . work_tsqcfpvhajcedozkby6jtihnzu 18 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 18 2 security security NN work_tsqcfpvhajcedozkby6jtihnzu 18 3 system system NN work_tsqcfpvhajcedozkby6jtihnzu 18 4 of of IN work_tsqcfpvhajcedozkby6jtihnzu 18 5 information information NN work_tsqcfpvhajcedozkby6jtihnzu 18 6 security security NN work_tsqcfpvhajcedozkby6jtihnzu 18 7 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 18 8 to to TO work_tsqcfpvhajcedozkby6jtihnzu 18 9 ensure ensure VB work_tsqcfpvhajcedozkby6jtihnzu 18 10 the the DT work_tsqcfpvhajcedozkby6jtihnzu 18 11 security security NN work_tsqcfpvhajcedozkby6jtihnzu 18 12 of of IN work_tsqcfpvhajcedozkby6jtihnzu 18 13 information information NN work_tsqcfpvhajcedozkby6jtihnzu 18 14 system system NN work_tsqcfpvhajcedozkby6jtihnzu 18 15 through through IN work_tsqcfpvhajcedozkby6jtihnzu 18 16 the the DT work_tsqcfpvhajcedozkby6jtihnzu 18 17 combination combination NN work_tsqcfpvhajcedozkby6jtihnzu 18 18 of of IN work_tsqcfpvhajcedozkby6jtihnzu 18 19 level level NN work_tsqcfpvhajcedozkby6jtihnzu 18 20 and and CC work_tsqcfpvhajcedozkby6jtihnzu 18 21 depth depth NN work_tsqcfpvhajcedozkby6jtihnzu 18 22 protection protection NN work_tsqcfpvhajcedozkby6jtihnzu 18 23 , , , work_tsqcfpvhajcedozkby6jtihnzu 18 24 active active JJ work_tsqcfpvhajcedozkby6jtihnzu 18 25 and and CC work_tsqcfpvhajcedozkby6jtihnzu 18 26 passive passive JJ work_tsqcfpvhajcedozkby6jtihnzu 18 27 defense defense NN work_tsqcfpvhajcedozkby6jtihnzu 18 28 . . . work_tsqcfpvhajcedozkby6jtihnzu 19 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 19 2 basic basic JJ work_tsqcfpvhajcedozkby6jtihnzu 19 3 components component NNS work_tsqcfpvhajcedozkby6jtihnzu 19 4 are be VBP work_tsqcfpvhajcedozkby6jtihnzu 19 5 shown show VBN work_tsqcfpvhajcedozkby6jtihnzu 19 6 in in IN work_tsqcfpvhajcedozkby6jtihnzu 19 7 Figure Figure NNP work_tsqcfpvhajcedozkby6jtihnzu 19 8 1 1 CD work_tsqcfpvhajcedozkby6jtihnzu 19 9 . . . work_tsqcfpvhajcedozkby6jtihnzu 20 1 Figure figure NN work_tsqcfpvhajcedozkby6jtihnzu 20 2 1 1 CD work_tsqcfpvhajcedozkby6jtihnzu 20 3 . . . work_tsqcfpvhajcedozkby6jtihnzu 21 1 Information information NN work_tsqcfpvhajcedozkby6jtihnzu 21 2 security security NN work_tsqcfpvhajcedozkby6jtihnzu 21 3 system system NN work_tsqcfpvhajcedozkby6jtihnzu 21 4 components component NNS work_tsqcfpvhajcedozkby6jtihnzu 21 5 In in IN work_tsqcfpvhajcedozkby6jtihnzu 21 6 the the DT work_tsqcfpvhajcedozkby6jtihnzu 21 7 system system NN work_tsqcfpvhajcedozkby6jtihnzu 21 8 of of IN work_tsqcfpvhajcedozkby6jtihnzu 21 9 " " `` work_tsqcfpvhajcedozkby6jtihnzu 21 10 human human JJ work_tsqcfpvhajcedozkby6jtihnzu 21 11 centered center VBN work_tsqcfpvhajcedozkby6jtihnzu 21 12 " " '' work_tsqcfpvhajcedozkby6jtihnzu 21 13 , , , work_tsqcfpvhajcedozkby6jtihnzu 21 14 the the DT work_tsqcfpvhajcedozkby6jtihnzu 21 15 information information NN work_tsqcfpvhajcedozkby6jtihnzu 21 16 security security NN work_tsqcfpvhajcedozkby6jtihnzu 21 17 system system NN work_tsqcfpvhajcedozkby6jtihnzu 21 18 not not RB work_tsqcfpvhajcedozkby6jtihnzu 21 19 only only RB work_tsqcfpvhajcedozkby6jtihnzu 21 20 attaches attach VBZ work_tsqcfpvhajcedozkby6jtihnzu 21 21 importance importance NN work_tsqcfpvhajcedozkby6jtihnzu 21 22 to to IN work_tsqcfpvhajcedozkby6jtihnzu 21 23 the the DT work_tsqcfpvhajcedozkby6jtihnzu 21 24 adoption adoption NN work_tsqcfpvhajcedozkby6jtihnzu 21 25 2nd 2nd JJ work_tsqcfpvhajcedozkby6jtihnzu 21 26 International International NNP work_tsqcfpvhajcedozkby6jtihnzu 21 27 Conference Conference NNP work_tsqcfpvhajcedozkby6jtihnzu 21 28 on on IN work_tsqcfpvhajcedozkby6jtihnzu 21 29 Sensor Sensor NNP work_tsqcfpvhajcedozkby6jtihnzu 21 30 Network Network NNP work_tsqcfpvhajcedozkby6jtihnzu 21 31 and and CC work_tsqcfpvhajcedozkby6jtihnzu 21 32 Computer Computer NNP work_tsqcfpvhajcedozkby6jtihnzu 21 33 Engineering Engineering NNP work_tsqcfpvhajcedozkby6jtihnzu 21 34 ( ( -LRB- work_tsqcfpvhajcedozkby6jtihnzu 21 35 ICSNCE ICSNCE NNP work_tsqcfpvhajcedozkby6jtihnzu 21 36 2018 2018 CD work_tsqcfpvhajcedozkby6jtihnzu 21 37 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 21 38 Copyright copyright NN work_tsqcfpvhajcedozkby6jtihnzu 21 39 © © NNP work_tsqcfpvhajcedozkby6jtihnzu 21 40 2018 2018 CD work_tsqcfpvhajcedozkby6jtihnzu 21 41 , , , work_tsqcfpvhajcedozkby6jtihnzu 21 42 the the DT work_tsqcfpvhajcedozkby6jtihnzu 21 43 Authors author NNS work_tsqcfpvhajcedozkby6jtihnzu 21 44 . . . work_tsqcfpvhajcedozkby6jtihnzu 22 1 Published publish VBN work_tsqcfpvhajcedozkby6jtihnzu 22 2 by by IN work_tsqcfpvhajcedozkby6jtihnzu 22 3 Atlantis Atlantis NNP work_tsqcfpvhajcedozkby6jtihnzu 22 4 Press Press NNP work_tsqcfpvhajcedozkby6jtihnzu 22 5 . . . work_tsqcfpvhajcedozkby6jtihnzu 23 1 This this DT work_tsqcfpvhajcedozkby6jtihnzu 23 2 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 23 3 an an DT work_tsqcfpvhajcedozkby6jtihnzu 23 4 open open JJ work_tsqcfpvhajcedozkby6jtihnzu 23 5 access access NN work_tsqcfpvhajcedozkby6jtihnzu 23 6 article article NN work_tsqcfpvhajcedozkby6jtihnzu 23 7 under under IN work_tsqcfpvhajcedozkby6jtihnzu 23 8 the the DT work_tsqcfpvhajcedozkby6jtihnzu 23 9 CC CC NNP work_tsqcfpvhajcedozkby6jtihnzu 23 10 BY BY NNP work_tsqcfpvhajcedozkby6jtihnzu 23 11 - - HYPH work_tsqcfpvhajcedozkby6jtihnzu 23 12 NC NC NNP work_tsqcfpvhajcedozkby6jtihnzu 23 13 license license NN work_tsqcfpvhajcedozkby6jtihnzu 23 14 ( ( -LRB- work_tsqcfpvhajcedozkby6jtihnzu 23 15 http://creativecommons.org/licenses/by-nc/4.0/ http://creativecommons.org/licenses/by-nc/4.0/ NNP work_tsqcfpvhajcedozkby6jtihnzu 23 16 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 23 17 . . . work_tsqcfpvhajcedozkby6jtihnzu 24 1 Advances advance NNS work_tsqcfpvhajcedozkby6jtihnzu 24 2 in in IN work_tsqcfpvhajcedozkby6jtihnzu 24 3 Computer Computer NNP work_tsqcfpvhajcedozkby6jtihnzu 24 4 Science Science NNP work_tsqcfpvhajcedozkby6jtihnzu 24 5 Research Research NNP work_tsqcfpvhajcedozkby6jtihnzu 24 6 , , , work_tsqcfpvhajcedozkby6jtihnzu 24 7 volume volume NN work_tsqcfpvhajcedozkby6jtihnzu 24 8 79 79 CD work_tsqcfpvhajcedozkby6jtihnzu 24 9 216 216 CD work_tsqcfpvhajcedozkby6jtihnzu 24 10 of of IN work_tsqcfpvhajcedozkby6jtihnzu 24 11 safety safety NN work_tsqcfpvhajcedozkby6jtihnzu 24 12 protection protection NN work_tsqcfpvhajcedozkby6jtihnzu 24 13 technology technology NN work_tsqcfpvhajcedozkby6jtihnzu 24 14 to to TO work_tsqcfpvhajcedozkby6jtihnzu 24 15 protect protect VB work_tsqcfpvhajcedozkby6jtihnzu 24 16 information information NN work_tsqcfpvhajcedozkby6jtihnzu 24 17 , , , work_tsqcfpvhajcedozkby6jtihnzu 24 18 but but CC work_tsqcfpvhajcedozkby6jtihnzu 24 19 also also RB work_tsqcfpvhajcedozkby6jtihnzu 24 20 emphasizes emphasize VBZ work_tsqcfpvhajcedozkby6jtihnzu 24 21 " " `` work_tsqcfpvhajcedozkby6jtihnzu 24 22 preventive preventive JJ work_tsqcfpvhajcedozkby6jtihnzu 24 23 measures measure NNS work_tsqcfpvhajcedozkby6jtihnzu 24 24 " " '' work_tsqcfpvhajcedozkby6jtihnzu 24 25 . . . work_tsqcfpvhajcedozkby6jtihnzu 25 1 Active active JJ work_tsqcfpvhajcedozkby6jtihnzu 25 2 defense defense NN work_tsqcfpvhajcedozkby6jtihnzu 25 3 strategy strategy NN work_tsqcfpvhajcedozkby6jtihnzu 25 4 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 25 5 adopted adopt VBN work_tsqcfpvhajcedozkby6jtihnzu 25 6 to to TO work_tsqcfpvhajcedozkby6jtihnzu 25 7 improve improve VB work_tsqcfpvhajcedozkby6jtihnzu 25 8 the the DT work_tsqcfpvhajcedozkby6jtihnzu 25 9 ability ability NN work_tsqcfpvhajcedozkby6jtihnzu 25 10 of of IN work_tsqcfpvhajcedozkby6jtihnzu 25 11 intrusion intrusion NN work_tsqcfpvhajcedozkby6jtihnzu 25 12 detection detection NN work_tsqcfpvhajcedozkby6jtihnzu 25 13 , , , work_tsqcfpvhajcedozkby6jtihnzu 25 14 vulnerability vulnerability NN work_tsqcfpvhajcedozkby6jtihnzu 25 15 scanning scanning NN work_tsqcfpvhajcedozkby6jtihnzu 25 16 , , , work_tsqcfpvhajcedozkby6jtihnzu 25 17 virus virus NN work_tsqcfpvhajcedozkby6jtihnzu 25 18 prevention prevention NN work_tsqcfpvhajcedozkby6jtihnzu 25 19 , , , work_tsqcfpvhajcedozkby6jtihnzu 25 20 evaluation evaluation NN work_tsqcfpvhajcedozkby6jtihnzu 25 21 and and CC work_tsqcfpvhajcedozkby6jtihnzu 25 22 audit audit NN work_tsqcfpvhajcedozkby6jtihnzu 25 23 , , , work_tsqcfpvhajcedozkby6jtihnzu 25 24 and and CC work_tsqcfpvhajcedozkby6jtihnzu 25 25 the the DT work_tsqcfpvhajcedozkby6jtihnzu 25 26 ability ability NN work_tsqcfpvhajcedozkby6jtihnzu 25 27 of of IN work_tsqcfpvhajcedozkby6jtihnzu 25 28 rapid rapid JJ work_tsqcfpvhajcedozkby6jtihnzu 25 29 response response NN work_tsqcfpvhajcedozkby6jtihnzu 25 30 and and CC work_tsqcfpvhajcedozkby6jtihnzu 25 31 recovery recovery NN work_tsqcfpvhajcedozkby6jtihnzu 25 32 after after IN work_tsqcfpvhajcedozkby6jtihnzu 25 33 attack attack NN work_tsqcfpvhajcedozkby6jtihnzu 25 34 . . . work_tsqcfpvhajcedozkby6jtihnzu 26 1 B. B. NNP work_tsqcfpvhajcedozkby6jtihnzu 27 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 27 2 Necessity Necessity NNP work_tsqcfpvhajcedozkby6jtihnzu 27 3 of of IN work_tsqcfpvhajcedozkby6jtihnzu 27 4 the the DT work_tsqcfpvhajcedozkby6jtihnzu 27 5 Research Research NNP work_tsqcfpvhajcedozkby6jtihnzu 27 6 on on IN work_tsqcfpvhajcedozkby6jtihnzu 27 7 the the DT work_tsqcfpvhajcedozkby6jtihnzu 27 8 Security Security NNP work_tsqcfpvhajcedozkby6jtihnzu 27 9 of of IN work_tsqcfpvhajcedozkby6jtihnzu 27 10 Information Information NNP work_tsqcfpvhajcedozkby6jtihnzu 27 11 Network Network NNP work_tsqcfpvhajcedozkby6jtihnzu 27 12 and and CC work_tsqcfpvhajcedozkby6jtihnzu 27 13 the the DT work_tsqcfpvhajcedozkby6jtihnzu 27 14 Establishment Establishment NNP work_tsqcfpvhajcedozkby6jtihnzu 27 15 of of IN work_tsqcfpvhajcedozkby6jtihnzu 27 16 the the DT work_tsqcfpvhajcedozkby6jtihnzu 27 17 Security Security NNP work_tsqcfpvhajcedozkby6jtihnzu 27 18 System System NNP work_tsqcfpvhajcedozkby6jtihnzu 27 19 The the DT work_tsqcfpvhajcedozkby6jtihnzu 27 20 development development NN work_tsqcfpvhajcedozkby6jtihnzu 27 21 of of IN work_tsqcfpvhajcedozkby6jtihnzu 27 22 information information NN work_tsqcfpvhajcedozkby6jtihnzu 27 23 network network NN work_tsqcfpvhajcedozkby6jtihnzu 27 24 technology technology NN work_tsqcfpvhajcedozkby6jtihnzu 27 25 has have VBZ work_tsqcfpvhajcedozkby6jtihnzu 27 26 accelerated accelerate VBN work_tsqcfpvhajcedozkby6jtihnzu 27 27 the the DT work_tsqcfpvhajcedozkby6jtihnzu 27 28 process process NN work_tsqcfpvhajcedozkby6jtihnzu 27 29 of of IN work_tsqcfpvhajcedozkby6jtihnzu 27 30 social social JJ work_tsqcfpvhajcedozkby6jtihnzu 27 31 information information NN work_tsqcfpvhajcedozkby6jtihnzu 27 32 . . . work_tsqcfpvhajcedozkby6jtihnzu 28 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 28 2 development development NN work_tsqcfpvhajcedozkby6jtihnzu 28 3 of of IN work_tsqcfpvhajcedozkby6jtihnzu 28 4 information information NN work_tsqcfpvhajcedozkby6jtihnzu 28 5 has have VBZ work_tsqcfpvhajcedozkby6jtihnzu 28 6 opened open VBN work_tsqcfpvhajcedozkby6jtihnzu 28 7 up up RP work_tsqcfpvhajcedozkby6jtihnzu 28 8 a a DT work_tsqcfpvhajcedozkby6jtihnzu 28 9 broad broad JJ work_tsqcfpvhajcedozkby6jtihnzu 28 10 space space NN work_tsqcfpvhajcedozkby6jtihnzu 28 11 for for IN work_tsqcfpvhajcedozkby6jtihnzu 28 12 the the DT work_tsqcfpvhajcedozkby6jtihnzu 28 13 application application NN work_tsqcfpvhajcedozkby6jtihnzu 28 14 of of IN work_tsqcfpvhajcedozkby6jtihnzu 28 15 the the DT work_tsqcfpvhajcedozkby6jtihnzu 28 16 information information NN work_tsqcfpvhajcedozkby6jtihnzu 28 17 network network NN work_tsqcfpvhajcedozkby6jtihnzu 28 18 system system NN work_tsqcfpvhajcedozkby6jtihnzu 28 19 . . . work_tsqcfpvhajcedozkby6jtihnzu 29 1 However however RB work_tsqcfpvhajcedozkby6jtihnzu 29 2 , , , work_tsqcfpvhajcedozkby6jtihnzu 29 3 because because IN work_tsqcfpvhajcedozkby6jtihnzu 29 4 of of IN work_tsqcfpvhajcedozkby6jtihnzu 29 5 the the DT work_tsqcfpvhajcedozkby6jtihnzu 29 6 irrational irrational JJ work_tsqcfpvhajcedozkby6jtihnzu 29 7 decision decision NN work_tsqcfpvhajcedozkby6jtihnzu 29 8 making make VBG work_tsqcfpvhajcedozkby6jtihnzu 29 9 for for IN work_tsqcfpvhajcedozkby6jtihnzu 29 10 the the DT work_tsqcfpvhajcedozkby6jtihnzu 29 11 development development NN work_tsqcfpvhajcedozkby6jtihnzu 29 12 of of IN work_tsqcfpvhajcedozkby6jtihnzu 29 13 technology technology NN work_tsqcfpvhajcedozkby6jtihnzu 29 14 for for IN work_tsqcfpvhajcedozkby6jtihnzu 29 15 many many JJ work_tsqcfpvhajcedozkby6jtihnzu 29 16 years year NNS work_tsqcfpvhajcedozkby6jtihnzu 29 17 , , , work_tsqcfpvhajcedozkby6jtihnzu 29 18 the the DT work_tsqcfpvhajcedozkby6jtihnzu 29 19 dependence dependence NN work_tsqcfpvhajcedozkby6jtihnzu 29 20 of of IN work_tsqcfpvhajcedozkby6jtihnzu 29 21 the the DT work_tsqcfpvhajcedozkby6jtihnzu 29 22 state state NN work_tsqcfpvhajcedozkby6jtihnzu 29 23 and and CC work_tsqcfpvhajcedozkby6jtihnzu 29 24 the the DT work_tsqcfpvhajcedozkby6jtihnzu 29 25 society society NN work_tsqcfpvhajcedozkby6jtihnzu 29 26 and and CC work_tsqcfpvhajcedozkby6jtihnzu 29 27 the the DT work_tsqcfpvhajcedozkby6jtihnzu 29 28 public public NN work_tsqcfpvhajcedozkby6jtihnzu 29 29 on on IN work_tsqcfpvhajcedozkby6jtihnzu 29 30 the the DT work_tsqcfpvhajcedozkby6jtihnzu 29 31 information information NN work_tsqcfpvhajcedozkby6jtihnzu 29 32 network network NN work_tsqcfpvhajcedozkby6jtihnzu 29 33 has have VBZ work_tsqcfpvhajcedozkby6jtihnzu 29 34 gradually gradually RB work_tsqcfpvhajcedozkby6jtihnzu 29 35 increased increase VBN work_tsqcfpvhajcedozkby6jtihnzu 29 36 . . . work_tsqcfpvhajcedozkby6jtihnzu 30 1 Information information NN work_tsqcfpvhajcedozkby6jtihnzu 30 2 network network NN work_tsqcfpvhajcedozkby6jtihnzu 30 3 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 30 4 realizing realize VBG work_tsqcfpvhajcedozkby6jtihnzu 30 5 information information NN work_tsqcfpvhajcedozkby6jtihnzu 30 6 exchange exchange NN work_tsqcfpvhajcedozkby6jtihnzu 30 7 and and CC work_tsqcfpvhajcedozkby6jtihnzu 30 8 sharing sharing NN work_tsqcfpvhajcedozkby6jtihnzu 30 9 . . . work_tsqcfpvhajcedozkby6jtihnzu 31 1 While while IN work_tsqcfpvhajcedozkby6jtihnzu 31 2 greatly greatly RB work_tsqcfpvhajcedozkby6jtihnzu 31 3 facilitating facilitate VBG work_tsqcfpvhajcedozkby6jtihnzu 31 4 and and CC work_tsqcfpvhajcedozkby6jtihnzu 31 5 enriching enrich VBG work_tsqcfpvhajcedozkby6jtihnzu 31 6 social social JJ work_tsqcfpvhajcedozkby6jtihnzu 31 7 life life NN work_tsqcfpvhajcedozkby6jtihnzu 31 8 , , , work_tsqcfpvhajcedozkby6jtihnzu 31 9 network network NN work_tsqcfpvhajcedozkby6jtihnzu 31 10 security security NN work_tsqcfpvhajcedozkby6jtihnzu 31 11 has have VBZ work_tsqcfpvhajcedozkby6jtihnzu 31 12 become become VBN work_tsqcfpvhajcedozkby6jtihnzu 31 13 an an DT work_tsqcfpvhajcedozkby6jtihnzu 31 14 important important JJ work_tsqcfpvhajcedozkby6jtihnzu 31 15 factor factor NN work_tsqcfpvhajcedozkby6jtihnzu 31 16 affecting affect VBG work_tsqcfpvhajcedozkby6jtihnzu 31 17 national national JJ work_tsqcfpvhajcedozkby6jtihnzu 31 18 security security NN work_tsqcfpvhajcedozkby6jtihnzu 31 19 and and CC work_tsqcfpvhajcedozkby6jtihnzu 31 20 social social JJ work_tsqcfpvhajcedozkby6jtihnzu 31 21 stability stability NN work_tsqcfpvhajcedozkby6jtihnzu 31 22 due due IN work_tsqcfpvhajcedozkby6jtihnzu 31 23 to to IN work_tsqcfpvhajcedozkby6jtihnzu 31 24 the the DT work_tsqcfpvhajcedozkby6jtihnzu 31 25 vulnerability vulnerability NN work_tsqcfpvhajcedozkby6jtihnzu 31 26 of of IN work_tsqcfpvhajcedozkby6jtihnzu 31 27 network network NN work_tsqcfpvhajcedozkby6jtihnzu 31 28 itself -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 31 29 and and CC work_tsqcfpvhajcedozkby6jtihnzu 31 30 human human JJ work_tsqcfpvhajcedozkby6jtihnzu 31 31 attacks attack NNS work_tsqcfpvhajcedozkby6jtihnzu 31 32 and and CC work_tsqcfpvhajcedozkby6jtihnzu 31 33 destruction destruction NN work_tsqcfpvhajcedozkby6jtihnzu 31 34 . . . work_tsqcfpvhajcedozkby6jtihnzu 32 1 Therefore therefore RB work_tsqcfpvhajcedozkby6jtihnzu 32 2 , , , work_tsqcfpvhajcedozkby6jtihnzu 32 3 the the DT work_tsqcfpvhajcedozkby6jtihnzu 32 4 current current JJ work_tsqcfpvhajcedozkby6jtihnzu 32 5 government government NN work_tsqcfpvhajcedozkby6jtihnzu 32 6 of of IN work_tsqcfpvhajcedozkby6jtihnzu 32 7 the the DT work_tsqcfpvhajcedozkby6jtihnzu 32 8 world world NN work_tsqcfpvhajcedozkby6jtihnzu 32 9 has have VBZ work_tsqcfpvhajcedozkby6jtihnzu 32 10 taken take VBN work_tsqcfpvhajcedozkby6jtihnzu 32 11 information information NN work_tsqcfpvhajcedozkby6jtihnzu 32 12 security security NN work_tsqcfpvhajcedozkby6jtihnzu 32 13 as as IN work_tsqcfpvhajcedozkby6jtihnzu 32 14 the the DT work_tsqcfpvhajcedozkby6jtihnzu 32 15 focus focus NN work_tsqcfpvhajcedozkby6jtihnzu 32 16 of of IN work_tsqcfpvhajcedozkby6jtihnzu 32 17 government government NN work_tsqcfpvhajcedozkby6jtihnzu 32 18 work work NN work_tsqcfpvhajcedozkby6jtihnzu 32 19 . . . work_tsqcfpvhajcedozkby6jtihnzu 33 1 Many many JJ work_tsqcfpvhajcedozkby6jtihnzu 33 2 laws law NNS work_tsqcfpvhajcedozkby6jtihnzu 33 3 and and CC work_tsqcfpvhajcedozkby6jtihnzu 33 4 regulations regulation NNS work_tsqcfpvhajcedozkby6jtihnzu 33 5 related relate VBN work_tsqcfpvhajcedozkby6jtihnzu 33 6 to to IN work_tsqcfpvhajcedozkby6jtihnzu 33 7 information information NN work_tsqcfpvhajcedozkby6jtihnzu 33 8 security security NN work_tsqcfpvhajcedozkby6jtihnzu 33 9 have have VBP work_tsqcfpvhajcedozkby6jtihnzu 33 10 been be VBN work_tsqcfpvhajcedozkby6jtihnzu 33 11 issued issue VBN work_tsqcfpvhajcedozkby6jtihnzu 33 12 . . . work_tsqcfpvhajcedozkby6jtihnzu 34 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 34 2 international international JJ work_tsqcfpvhajcedozkby6jtihnzu 34 3 organization organization NN work_tsqcfpvhajcedozkby6jtihnzu 34 4 for for IN work_tsqcfpvhajcedozkby6jtihnzu 34 5 standardization standardization NN work_tsqcfpvhajcedozkby6jtihnzu 34 6 has have VBZ work_tsqcfpvhajcedozkby6jtihnzu 34 7 also also RB work_tsqcfpvhajcedozkby6jtihnzu 34 8 developed develop VBN work_tsqcfpvhajcedozkby6jtihnzu 34 9 a a DT work_tsqcfpvhajcedozkby6jtihnzu 34 10 large large JJ work_tsqcfpvhajcedozkby6jtihnzu 34 11 number number NN work_tsqcfpvhajcedozkby6jtihnzu 34 12 of of IN work_tsqcfpvhajcedozkby6jtihnzu 34 13 safety safety NN work_tsqcfpvhajcedozkby6jtihnzu 34 14 standards standard NNS work_tsqcfpvhajcedozkby6jtihnzu 34 15 . . . work_tsqcfpvhajcedozkby6jtihnzu 35 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 35 2 information information NN work_tsqcfpvhajcedozkby6jtihnzu 35 3 security security NN work_tsqcfpvhajcedozkby6jtihnzu 35 4 system system NN work_tsqcfpvhajcedozkby6jtihnzu 35 5 in in IN work_tsqcfpvhajcedozkby6jtihnzu 35 6 China China NNP work_tsqcfpvhajcedozkby6jtihnzu 35 7 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 35 8 also also RB work_tsqcfpvhajcedozkby6jtihnzu 35 9 under under IN work_tsqcfpvhajcedozkby6jtihnzu 35 10 construction construction NN work_tsqcfpvhajcedozkby6jtihnzu 35 11 . . . work_tsqcfpvhajcedozkby6jtihnzu 36 1 According accord VBG work_tsqcfpvhajcedozkby6jtihnzu 36 2 to to IN work_tsqcfpvhajcedozkby6jtihnzu 36 3 the the DT work_tsqcfpvhajcedozkby6jtihnzu 36 4 goal goal NN work_tsqcfpvhajcedozkby6jtihnzu 36 5 of of IN work_tsqcfpvhajcedozkby6jtihnzu 36 6 information information NN work_tsqcfpvhajcedozkby6jtihnzu 36 7 security security NN work_tsqcfpvhajcedozkby6jtihnzu 36 8 system system NN work_tsqcfpvhajcedozkby6jtihnzu 36 9 in in IN work_tsqcfpvhajcedozkby6jtihnzu 36 10 China China NNP work_tsqcfpvhajcedozkby6jtihnzu 36 11 , , , work_tsqcfpvhajcedozkby6jtihnzu 36 12 the the DT work_tsqcfpvhajcedozkby6jtihnzu 36 13 design design NN work_tsqcfpvhajcedozkby6jtihnzu 36 14 and and CC work_tsqcfpvhajcedozkby6jtihnzu 36 15 implementation implementation NN work_tsqcfpvhajcedozkby6jtihnzu 36 16 of of IN work_tsqcfpvhajcedozkby6jtihnzu 36 17 information information NN work_tsqcfpvhajcedozkby6jtihnzu 36 18 network network NN work_tsqcfpvhajcedozkby6jtihnzu 36 19 security security NN work_tsqcfpvhajcedozkby6jtihnzu 36 20 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 36 21 comprehensively comprehensively RB work_tsqcfpvhajcedozkby6jtihnzu 36 22 considered consider VBN work_tsqcfpvhajcedozkby6jtihnzu 36 23 from from IN work_tsqcfpvhajcedozkby6jtihnzu 36 24 the the DT work_tsqcfpvhajcedozkby6jtihnzu 36 25 perspective perspective NN work_tsqcfpvhajcedozkby6jtihnzu 36 26 of of IN work_tsqcfpvhajcedozkby6jtihnzu 36 27 personnel personnel NNS work_tsqcfpvhajcedozkby6jtihnzu 36 28 , , , work_tsqcfpvhajcedozkby6jtihnzu 36 29 technology technology NN work_tsqcfpvhajcedozkby6jtihnzu 36 30 , , , work_tsqcfpvhajcedozkby6jtihnzu 36 31 management management NN work_tsqcfpvhajcedozkby6jtihnzu 36 32 , , , work_tsqcfpvhajcedozkby6jtihnzu 36 33 legislation legislation NN work_tsqcfpvhajcedozkby6jtihnzu 36 34 and and CC work_tsqcfpvhajcedozkby6jtihnzu 36 35 operation operation NN work_tsqcfpvhajcedozkby6jtihnzu 36 36 . . . work_tsqcfpvhajcedozkby6jtihnzu 37 1 We -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 37 2 have have VBP work_tsqcfpvhajcedozkby6jtihnzu 37 3 put put VBN work_tsqcfpvhajcedozkby6jtihnzu 37 4 forward forward RP work_tsqcfpvhajcedozkby6jtihnzu 37 5 the the DT work_tsqcfpvhajcedozkby6jtihnzu 37 6 international international JJ work_tsqcfpvhajcedozkby6jtihnzu 37 7 safety safety NN work_tsqcfpvhajcedozkby6jtihnzu 37 8 standards standard NNS work_tsqcfpvhajcedozkby6jtihnzu 37 9 and and CC work_tsqcfpvhajcedozkby6jtihnzu 37 10 national national JJ work_tsqcfpvhajcedozkby6jtihnzu 37 11 security security NN work_tsqcfpvhajcedozkby6jtihnzu 37 12 law law NN work_tsqcfpvhajcedozkby6jtihnzu 37 13 as as IN work_tsqcfpvhajcedozkby6jtihnzu 37 14 a a DT work_tsqcfpvhajcedozkby6jtihnzu 37 15 guide guide NN work_tsqcfpvhajcedozkby6jtihnzu 37 16 , , , work_tsqcfpvhajcedozkby6jtihnzu 37 17 the the DT work_tsqcfpvhajcedozkby6jtihnzu 37 18 use use NN work_tsqcfpvhajcedozkby6jtihnzu 37 19 of of IN work_tsqcfpvhajcedozkby6jtihnzu 37 20 information information NN work_tsqcfpvhajcedozkby6jtihnzu 37 21 system system NN work_tsqcfpvhajcedozkby6jtihnzu 37 22 security security NN work_tsqcfpvhajcedozkby6jtihnzu 37 23 engineering engineering NN work_tsqcfpvhajcedozkby6jtihnzu 37 24 method method NN work_tsqcfpvhajcedozkby6jtihnzu 37 25 , , , work_tsqcfpvhajcedozkby6jtihnzu 37 26 through through IN work_tsqcfpvhajcedozkby6jtihnzu 37 27 rigorous rigorous JJ work_tsqcfpvhajcedozkby6jtihnzu 37 28 management management NN work_tsqcfpvhajcedozkby6jtihnzu 37 29 , , , work_tsqcfpvhajcedozkby6jtihnzu 37 30 adequate adequate JJ work_tsqcfpvhajcedozkby6jtihnzu 37 31 funding funding NN work_tsqcfpvhajcedozkby6jtihnzu 37 32 , , , work_tsqcfpvhajcedozkby6jtihnzu 37 33 strong strong JJ work_tsqcfpvhajcedozkby6jtihnzu 37 34 talent talent NN work_tsqcfpvhajcedozkby6jtihnzu 37 35 support support NN work_tsqcfpvhajcedozkby6jtihnzu 37 36 , , , work_tsqcfpvhajcedozkby6jtihnzu 37 37 strong strong JJ work_tsqcfpvhajcedozkby6jtihnzu 37 38 technical technical JJ work_tsqcfpvhajcedozkby6jtihnzu 37 39 guarantee guarantee NN work_tsqcfpvhajcedozkby6jtihnzu 37 40 , , , work_tsqcfpvhajcedozkby6jtihnzu 37 41 establish establish VB work_tsqcfpvhajcedozkby6jtihnzu 37 42 and and CC work_tsqcfpvhajcedozkby6jtihnzu 37 43 improve improve VB work_tsqcfpvhajcedozkby6jtihnzu 37 44 the the DT work_tsqcfpvhajcedozkby6jtihnzu 37 45 network network NN work_tsqcfpvhajcedozkby6jtihnzu 37 46 security security NN work_tsqcfpvhajcedozkby6jtihnzu 37 47 plan plan NN work_tsqcfpvhajcedozkby6jtihnzu 37 48 and and CC work_tsqcfpvhajcedozkby6jtihnzu 37 49 disaster disaster NN work_tsqcfpvhajcedozkby6jtihnzu 37 50 recovery recovery NN work_tsqcfpvhajcedozkby6jtihnzu 37 51 plan plan NN work_tsqcfpvhajcedozkby6jtihnzu 37 52 . . . work_tsqcfpvhajcedozkby6jtihnzu 38 1 Based base VBN work_tsqcfpvhajcedozkby6jtihnzu 38 2 on on IN work_tsqcfpvhajcedozkby6jtihnzu 38 3 the the DT work_tsqcfpvhajcedozkby6jtihnzu 38 4 principle principle NN work_tsqcfpvhajcedozkby6jtihnzu 38 5 of of IN work_tsqcfpvhajcedozkby6jtihnzu 38 6 " " `` work_tsqcfpvhajcedozkby6jtihnzu 38 7 people people NNS work_tsqcfpvhajcedozkby6jtihnzu 38 8 first first RB work_tsqcfpvhajcedozkby6jtihnzu 38 9 " " '' work_tsqcfpvhajcedozkby6jtihnzu 38 10 , , , work_tsqcfpvhajcedozkby6jtihnzu 38 11 we -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 38 12 should should MD work_tsqcfpvhajcedozkby6jtihnzu 38 13 achieve achieve VB work_tsqcfpvhajcedozkby6jtihnzu 38 14 the the DT work_tsqcfpvhajcedozkby6jtihnzu 38 15 goal goal NN work_tsqcfpvhajcedozkby6jtihnzu 38 16 of of IN work_tsqcfpvhajcedozkby6jtihnzu 38 17 achieving achieve VBG work_tsqcfpvhajcedozkby6jtihnzu 38 18 all all DT work_tsqcfpvhajcedozkby6jtihnzu 38 19 levels level NNS work_tsqcfpvhajcedozkby6jtihnzu 38 20 of of IN work_tsqcfpvhajcedozkby6jtihnzu 38 21 safety safety NN work_tsqcfpvhajcedozkby6jtihnzu 38 22 assurance assurance NN work_tsqcfpvhajcedozkby6jtihnzu 38 23 from from IN work_tsqcfpvhajcedozkby6jtihnzu 38 24 border border NN work_tsqcfpvhajcedozkby6jtihnzu 38 25 security security NN work_tsqcfpvhajcedozkby6jtihnzu 38 26 to to TO work_tsqcfpvhajcedozkby6jtihnzu 38 27 host host VB work_tsqcfpvhajcedozkby6jtihnzu 38 28 safety safety NN work_tsqcfpvhajcedozkby6jtihnzu 38 29 , , , work_tsqcfpvhajcedozkby6jtihnzu 38 30 and and CC work_tsqcfpvhajcedozkby6jtihnzu 38 31 strive strive VB work_tsqcfpvhajcedozkby6jtihnzu 38 32 to to TO work_tsqcfpvhajcedozkby6jtihnzu 38 33 reduce reduce VB work_tsqcfpvhajcedozkby6jtihnzu 38 34 the the DT work_tsqcfpvhajcedozkby6jtihnzu 38 35 security security NN work_tsqcfpvhajcedozkby6jtihnzu 38 36 threat threat NN work_tsqcfpvhajcedozkby6jtihnzu 38 37 to to IN work_tsqcfpvhajcedozkby6jtihnzu 38 38 an an DT work_tsqcfpvhajcedozkby6jtihnzu 38 39 acceptable acceptable JJ work_tsqcfpvhajcedozkby6jtihnzu 38 40 level level NN work_tsqcfpvhajcedozkby6jtihnzu 38 41 and and CC work_tsqcfpvhajcedozkby6jtihnzu 38 42 effectively effectively RB work_tsqcfpvhajcedozkby6jtihnzu 38 43 control control VB work_tsqcfpvhajcedozkby6jtihnzu 38 44 risks risk NNS work_tsqcfpvhajcedozkby6jtihnzu 38 45 . . . work_tsqcfpvhajcedozkby6jtihnzu 39 1 In in IN work_tsqcfpvhajcedozkby6jtihnzu 39 2 the the DT work_tsqcfpvhajcedozkby6jtihnzu 39 3 event event NN work_tsqcfpvhajcedozkby6jtihnzu 39 4 of of IN work_tsqcfpvhajcedozkby6jtihnzu 39 5 an an DT work_tsqcfpvhajcedozkby6jtihnzu 39 6 invasion invasion NN work_tsqcfpvhajcedozkby6jtihnzu 39 7 and and CC work_tsqcfpvhajcedozkby6jtihnzu 39 8 other other JJ work_tsqcfpvhajcedozkby6jtihnzu 39 9 disasters disaster NNS work_tsqcfpvhajcedozkby6jtihnzu 39 10 , , , work_tsqcfpvhajcedozkby6jtihnzu 39 11 a a DT work_tsqcfpvhajcedozkby6jtihnzu 39 12 full full JJ work_tsqcfpvhajcedozkby6jtihnzu 39 13 range range NN work_tsqcfpvhajcedozkby6jtihnzu 39 14 of of IN work_tsqcfpvhajcedozkby6jtihnzu 39 15 security security NN work_tsqcfpvhajcedozkby6jtihnzu 39 16 strategic strategic JJ work_tsqcfpvhajcedozkby6jtihnzu 39 17 objectives objective NNS work_tsqcfpvhajcedozkby6jtihnzu 39 18 with with IN work_tsqcfpvhajcedozkby6jtihnzu 39 19 powerful powerful JJ work_tsqcfpvhajcedozkby6jtihnzu 39 20 recovery recovery NN work_tsqcfpvhajcedozkby6jtihnzu 39 21 and and CC work_tsqcfpvhajcedozkby6jtihnzu 39 22 counterattack counterattack JJ work_tsqcfpvhajcedozkby6jtihnzu 39 23 capabilities capability NNS work_tsqcfpvhajcedozkby6jtihnzu 39 24 are be VBP work_tsqcfpvhajcedozkby6jtihnzu 39 25 achieved achieve VBN work_tsqcfpvhajcedozkby6jtihnzu 39 26 . . . work_tsqcfpvhajcedozkby6jtihnzu 40 1 II ii CD work_tsqcfpvhajcedozkby6jtihnzu 40 2 . . . work_tsqcfpvhajcedozkby6jtihnzu 41 1 NETWORK NETWORK NNP work_tsqcfpvhajcedozkby6jtihnzu 41 2 SECURITY SECURITY NNP work_tsqcfpvhajcedozkby6jtihnzu 41 3 PLAN PLAN NNP work_tsqcfpvhajcedozkby6jtihnzu 41 4 A. a. NN work_tsqcfpvhajcedozkby6jtihnzu 42 1 Objectives objective NNS work_tsqcfpvhajcedozkby6jtihnzu 42 2 of of IN work_tsqcfpvhajcedozkby6jtihnzu 42 3 the the DT work_tsqcfpvhajcedozkby6jtihnzu 42 4 Security Security NNP work_tsqcfpvhajcedozkby6jtihnzu 42 5 Plan Plan NNP work_tsqcfpvhajcedozkby6jtihnzu 42 6 According accord VBG work_tsqcfpvhajcedozkby6jtihnzu 42 7 to to IN work_tsqcfpvhajcedozkby6jtihnzu 42 8 the the DT work_tsqcfpvhajcedozkby6jtihnzu 42 9 relevant relevant JJ work_tsqcfpvhajcedozkby6jtihnzu 42 10 national national JJ work_tsqcfpvhajcedozkby6jtihnzu 42 11 laws law NNS work_tsqcfpvhajcedozkby6jtihnzu 42 12 and and CC work_tsqcfpvhajcedozkby6jtihnzu 42 13 regulations regulation NNS work_tsqcfpvhajcedozkby6jtihnzu 42 14 , , , work_tsqcfpvhajcedozkby6jtihnzu 42 15 as as RB work_tsqcfpvhajcedozkby6jtihnzu 42 16 well well RB work_tsqcfpvhajcedozkby6jtihnzu 42 17 as as IN work_tsqcfpvhajcedozkby6jtihnzu 42 18 the the DT work_tsqcfpvhajcedozkby6jtihnzu 42 19 strategic strategic JJ work_tsqcfpvhajcedozkby6jtihnzu 42 20 objectives objective NNS work_tsqcfpvhajcedozkby6jtihnzu 42 21 of of IN work_tsqcfpvhajcedozkby6jtihnzu 42 22 the the DT work_tsqcfpvhajcedozkby6jtihnzu 42 23 information information NN work_tsqcfpvhajcedozkby6jtihnzu 42 24 network network NN work_tsqcfpvhajcedozkby6jtihnzu 42 25 security security NN work_tsqcfpvhajcedozkby6jtihnzu 42 26 system system NN work_tsqcfpvhajcedozkby6jtihnzu 42 27 , , , work_tsqcfpvhajcedozkby6jtihnzu 42 28 the the DT work_tsqcfpvhajcedozkby6jtihnzu 42 29 network network NN work_tsqcfpvhajcedozkby6jtihnzu 42 30 security security NN work_tsqcfpvhajcedozkby6jtihnzu 42 31 plan plan NN work_tsqcfpvhajcedozkby6jtihnzu 42 32 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 42 33 formulated formulate VBN work_tsqcfpvhajcedozkby6jtihnzu 42 34 . . . work_tsqcfpvhajcedozkby6jtihnzu 43 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 43 2 aim aim NN work_tsqcfpvhajcedozkby6jtihnzu 43 3 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 43 4 to to TO work_tsqcfpvhajcedozkby6jtihnzu 43 5 strengthen strengthen VB work_tsqcfpvhajcedozkby6jtihnzu 43 6 the the DT work_tsqcfpvhajcedozkby6jtihnzu 43 7 security security NN work_tsqcfpvhajcedozkby6jtihnzu 43 8 of of IN work_tsqcfpvhajcedozkby6jtihnzu 43 9 network network NN work_tsqcfpvhajcedozkby6jtihnzu 43 10 security security NN work_tsqcfpvhajcedozkby6jtihnzu 43 11 and and CC work_tsqcfpvhajcedozkby6jtihnzu 43 12 establish establish VB work_tsqcfpvhajcedozkby6jtihnzu 43 13 a a DT work_tsqcfpvhajcedozkby6jtihnzu 43 14 relatively relatively RB work_tsqcfpvhajcedozkby6jtihnzu 43 15 safe safe JJ work_tsqcfpvhajcedozkby6jtihnzu 43 16 information information NN work_tsqcfpvhajcedozkby6jtihnzu 43 17 network network NN work_tsqcfpvhajcedozkby6jtihnzu 43 18 environment environment NN work_tsqcfpvhajcedozkby6jtihnzu 43 19 . . . work_tsqcfpvhajcedozkby6jtihnzu 44 1 Through through IN work_tsqcfpvhajcedozkby6jtihnzu 44 2 the the DT work_tsqcfpvhajcedozkby6jtihnzu 44 3 effective effective JJ work_tsqcfpvhajcedozkby6jtihnzu 44 4 implementation implementation NN work_tsqcfpvhajcedozkby6jtihnzu 44 5 of of IN work_tsqcfpvhajcedozkby6jtihnzu 44 6 the the DT work_tsqcfpvhajcedozkby6jtihnzu 44 7 plan plan NN work_tsqcfpvhajcedozkby6jtihnzu 44 8 , , , work_tsqcfpvhajcedozkby6jtihnzu 44 9 the the DT work_tsqcfpvhajcedozkby6jtihnzu 44 10 following follow VBG work_tsqcfpvhajcedozkby6jtihnzu 44 11 four four CD work_tsqcfpvhajcedozkby6jtihnzu 44 12 major major JJ work_tsqcfpvhajcedozkby6jtihnzu 44 13 goals goal NNS work_tsqcfpvhajcedozkby6jtihnzu 44 14 are be VBP work_tsqcfpvhajcedozkby6jtihnzu 44 15 achieved achieve VBN work_tsqcfpvhajcedozkby6jtihnzu 44 16 : : : work_tsqcfpvhajcedozkby6jtihnzu 44 17 1 1 LS work_tsqcfpvhajcedozkby6jtihnzu 44 18 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 44 19 Establish establish VB work_tsqcfpvhajcedozkby6jtihnzu 44 20 a a DT work_tsqcfpvhajcedozkby6jtihnzu 44 21 solid solid JJ work_tsqcfpvhajcedozkby6jtihnzu 44 22 technical technical JJ work_tsqcfpvhajcedozkby6jtihnzu 44 23 basis basis NN work_tsqcfpvhajcedozkby6jtihnzu 44 24 . . . work_tsqcfpvhajcedozkby6jtihnzu 45 1 We -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 45 2 should should MD work_tsqcfpvhajcedozkby6jtihnzu 45 3 educate educate VB work_tsqcfpvhajcedozkby6jtihnzu 45 4 and and CC work_tsqcfpvhajcedozkby6jtihnzu 45 5 train train VB work_tsqcfpvhajcedozkby6jtihnzu 45 6 technical technical JJ work_tsqcfpvhajcedozkby6jtihnzu 45 7 groups group NNS work_tsqcfpvhajcedozkby6jtihnzu 45 8 with with IN work_tsqcfpvhajcedozkby6jtihnzu 45 9 strong strong JJ work_tsqcfpvhajcedozkby6jtihnzu 45 10 network network NN work_tsqcfpvhajcedozkby6jtihnzu 45 11 security security NN work_tsqcfpvhajcedozkby6jtihnzu 45 12 capabilities capability NNS work_tsqcfpvhajcedozkby6jtihnzu 45 13 , , , work_tsqcfpvhajcedozkby6jtihnzu 45 14 establish establish VB work_tsqcfpvhajcedozkby6jtihnzu 45 15 relevant relevant JJ work_tsqcfpvhajcedozkby6jtihnzu 45 16 organizations organization NNS work_tsqcfpvhajcedozkby6jtihnzu 45 17 , , , work_tsqcfpvhajcedozkby6jtihnzu 45 18 identify identify VB work_tsqcfpvhajcedozkby6jtihnzu 45 19 and and CC work_tsqcfpvhajcedozkby6jtihnzu 45 20 improve improve VB work_tsqcfpvhajcedozkby6jtihnzu 45 21 the the DT work_tsqcfpvhajcedozkby6jtihnzu 45 22 responsibilities responsibility NNS work_tsqcfpvhajcedozkby6jtihnzu 45 23 of of IN work_tsqcfpvhajcedozkby6jtihnzu 45 24 security security NN work_tsqcfpvhajcedozkby6jtihnzu 45 25 personnel personnel NNS work_tsqcfpvhajcedozkby6jtihnzu 45 26 , , , work_tsqcfpvhajcedozkby6jtihnzu 45 27 and and CC work_tsqcfpvhajcedozkby6jtihnzu 45 28 defend defend VB work_tsqcfpvhajcedozkby6jtihnzu 45 29 , , , work_tsqcfpvhajcedozkby6jtihnzu 45 30 detect detect VBP work_tsqcfpvhajcedozkby6jtihnzu 45 31 , , , work_tsqcfpvhajcedozkby6jtihnzu 45 32 respond respond VB work_tsqcfpvhajcedozkby6jtihnzu 45 33 and and CC work_tsqcfpvhajcedozkby6jtihnzu 45 34 recover recover VB work_tsqcfpvhajcedozkby6jtihnzu 45 35 against against IN work_tsqcfpvhajcedozkby6jtihnzu 45 36 possible possible JJ work_tsqcfpvhajcedozkby6jtihnzu 45 37 infringed infringe VBN work_tsqcfpvhajcedozkby6jtihnzu 45 38 networks network NNS work_tsqcfpvhajcedozkby6jtihnzu 45 39 . . . work_tsqcfpvhajcedozkby6jtihnzu 46 1 2 2 LS work_tsqcfpvhajcedozkby6jtihnzu 46 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 46 3 Detection detection NN work_tsqcfpvhajcedozkby6jtihnzu 46 4 and and CC work_tsqcfpvhajcedozkby6jtihnzu 46 5 response response NN work_tsqcfpvhajcedozkby6jtihnzu 46 6 . . . work_tsqcfpvhajcedozkby6jtihnzu 47 1 Detection detection NN work_tsqcfpvhajcedozkby6jtihnzu 47 2 and and CC work_tsqcfpvhajcedozkby6jtihnzu 47 3 monitoring monitoring NN work_tsqcfpvhajcedozkby6jtihnzu 47 4 of of IN work_tsqcfpvhajcedozkby6jtihnzu 47 5 network network NN work_tsqcfpvhajcedozkby6jtihnzu 47 6 status status NN work_tsqcfpvhajcedozkby6jtihnzu 47 7 should should MD work_tsqcfpvhajcedozkby6jtihnzu 47 8 be be VB work_tsqcfpvhajcedozkby6jtihnzu 47 9 timely timely JJ work_tsqcfpvhajcedozkby6jtihnzu 47 10 . . . work_tsqcfpvhajcedozkby6jtihnzu 48 1 When when WRB work_tsqcfpvhajcedozkby6jtihnzu 48 2 an an DT work_tsqcfpvhajcedozkby6jtihnzu 48 3 attack attack NN work_tsqcfpvhajcedozkby6jtihnzu 48 4 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 48 5 found find VBN work_tsqcfpvhajcedozkby6jtihnzu 48 6 , , , work_tsqcfpvhajcedozkby6jtihnzu 48 7 it -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 48 8 can can MD work_tsqcfpvhajcedozkby6jtihnzu 48 9 react react VB work_tsqcfpvhajcedozkby6jtihnzu 48 10 quickly quickly RB work_tsqcfpvhajcedozkby6jtihnzu 48 11 and and CC work_tsqcfpvhajcedozkby6jtihnzu 48 12 control control VB work_tsqcfpvhajcedozkby6jtihnzu 48 13 the the DT work_tsqcfpvhajcedozkby6jtihnzu 48 14 attack attack NN work_tsqcfpvhajcedozkby6jtihnzu 48 15 , , , work_tsqcfpvhajcedozkby6jtihnzu 48 16 and and CC work_tsqcfpvhajcedozkby6jtihnzu 48 17 quickly quickly RB work_tsqcfpvhajcedozkby6jtihnzu 48 18 restore restore VB work_tsqcfpvhajcedozkby6jtihnzu 48 19 or or CC work_tsqcfpvhajcedozkby6jtihnzu 48 20 rebuild rebuild VBP work_tsqcfpvhajcedozkby6jtihnzu 48 21 the the DT work_tsqcfpvhajcedozkby6jtihnzu 48 22 normal normal JJ work_tsqcfpvhajcedozkby6jtihnzu 48 23 running running NN work_tsqcfpvhajcedozkby6jtihnzu 48 24 state state NN work_tsqcfpvhajcedozkby6jtihnzu 48 25 of of IN work_tsqcfpvhajcedozkby6jtihnzu 48 26 the the DT work_tsqcfpvhajcedozkby6jtihnzu 48 27 network network NN work_tsqcfpvhajcedozkby6jtihnzu 48 28 . . . work_tsqcfpvhajcedozkby6jtihnzu 49 1 3 3 LS work_tsqcfpvhajcedozkby6jtihnzu 49 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 49 3 Defense defense NN work_tsqcfpvhajcedozkby6jtihnzu 49 4 and and CC work_tsqcfpvhajcedozkby6jtihnzu 49 5 recovery recovery NN work_tsqcfpvhajcedozkby6jtihnzu 49 6 . . . work_tsqcfpvhajcedozkby6jtihnzu 50 1 Establish establish VB work_tsqcfpvhajcedozkby6jtihnzu 50 2 an an DT work_tsqcfpvhajcedozkby6jtihnzu 50 3 efficient efficient JJ work_tsqcfpvhajcedozkby6jtihnzu 50 4 network network NN work_tsqcfpvhajcedozkby6jtihnzu 50 5 defense defense NN work_tsqcfpvhajcedozkby6jtihnzu 50 6 system system NN work_tsqcfpvhajcedozkby6jtihnzu 50 7 . . . work_tsqcfpvhajcedozkby6jtihnzu 51 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 51 2 protection protection NN work_tsqcfpvhajcedozkby6jtihnzu 51 3 of of IN work_tsqcfpvhajcedozkby6jtihnzu 51 4 key key JJ work_tsqcfpvhajcedozkby6jtihnzu 51 5 infrastructure infrastructure NN work_tsqcfpvhajcedozkby6jtihnzu 51 6 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 51 7 free free JJ work_tsqcfpvhajcedozkby6jtihnzu 51 8 from from IN work_tsqcfpvhajcedozkby6jtihnzu 51 9 network network NN work_tsqcfpvhajcedozkby6jtihnzu 51 10 invasion invasion NN work_tsqcfpvhajcedozkby6jtihnzu 51 11 and and CC work_tsqcfpvhajcedozkby6jtihnzu 51 12 virus virus NN work_tsqcfpvhajcedozkby6jtihnzu 51 13 invasion invasion NN work_tsqcfpvhajcedozkby6jtihnzu 51 14 . . . work_tsqcfpvhajcedozkby6jtihnzu 52 1 Reduce reduce VB work_tsqcfpvhajcedozkby6jtihnzu 52 2 network network NN work_tsqcfpvhajcedozkby6jtihnzu 52 3 vulnerability vulnerability NN work_tsqcfpvhajcedozkby6jtihnzu 52 4 . . . work_tsqcfpvhajcedozkby6jtihnzu 53 1 It -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 53 2 has have VBZ work_tsqcfpvhajcedozkby6jtihnzu 53 3 strong strong JJ work_tsqcfpvhajcedozkby6jtihnzu 53 4 defense defense NN work_tsqcfpvhajcedozkby6jtihnzu 53 5 and and CC work_tsqcfpvhajcedozkby6jtihnzu 53 6 recovery recovery NN work_tsqcfpvhajcedozkby6jtihnzu 53 7 capabilities capability NNS work_tsqcfpvhajcedozkby6jtihnzu 53 8 for for IN work_tsqcfpvhajcedozkby6jtihnzu 53 9 network network NN work_tsqcfpvhajcedozkby6jtihnzu 53 10 attacks attack NNS work_tsqcfpvhajcedozkby6jtihnzu 53 11 that that WDT work_tsqcfpvhajcedozkby6jtihnzu 53 12 have have VBP work_tsqcfpvhajcedozkby6jtihnzu 53 13 occurred occur VBN work_tsqcfpvhajcedozkby6jtihnzu 53 14 and and CC work_tsqcfpvhajcedozkby6jtihnzu 53 15 may may MD work_tsqcfpvhajcedozkby6jtihnzu 53 16 occur occur VB work_tsqcfpvhajcedozkby6jtihnzu 53 17 . . . work_tsqcfpvhajcedozkby6jtihnzu 54 1 4 4 LS work_tsqcfpvhajcedozkby6jtihnzu 54 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 54 3 The the DT work_tsqcfpvhajcedozkby6jtihnzu 54 4 necessary necessary JJ work_tsqcfpvhajcedozkby6jtihnzu 54 5 ability ability NN work_tsqcfpvhajcedozkby6jtihnzu 54 6 to to TO work_tsqcfpvhajcedozkby6jtihnzu 54 7 counterattack counterattack VB work_tsqcfpvhajcedozkby6jtihnzu 54 8 . . . work_tsqcfpvhajcedozkby6jtihnzu 55 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 55 2 existing exist VBG work_tsqcfpvhajcedozkby6jtihnzu 55 3 security security NN work_tsqcfpvhajcedozkby6jtihnzu 55 4 defense defense NN work_tsqcfpvhajcedozkby6jtihnzu 55 5 capability capability NN work_tsqcfpvhajcedozkby6jtihnzu 55 6 may may MD work_tsqcfpvhajcedozkby6jtihnzu 55 7 not not RB work_tsqcfpvhajcedozkby6jtihnzu 55 8 be be VB work_tsqcfpvhajcedozkby6jtihnzu 55 9 enough enough JJ work_tsqcfpvhajcedozkby6jtihnzu 55 10 to to TO work_tsqcfpvhajcedozkby6jtihnzu 55 11 achieve achieve VB work_tsqcfpvhajcedozkby6jtihnzu 55 12 the the DT work_tsqcfpvhajcedozkby6jtihnzu 55 13 desired desire VBN work_tsqcfpvhajcedozkby6jtihnzu 55 14 security security NN work_tsqcfpvhajcedozkby6jtihnzu 55 15 target target NN work_tsqcfpvhajcedozkby6jtihnzu 55 16 for for IN work_tsqcfpvhajcedozkby6jtihnzu 55 17 the the DT work_tsqcfpvhajcedozkby6jtihnzu 55 18 aggressive aggressive JJ work_tsqcfpvhajcedozkby6jtihnzu 55 19 attack attack NN work_tsqcfpvhajcedozkby6jtihnzu 55 20 . . . work_tsqcfpvhajcedozkby6jtihnzu 56 1 It -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 56 2 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 56 3 necessary necessary JJ work_tsqcfpvhajcedozkby6jtihnzu 56 4 to to TO work_tsqcfpvhajcedozkby6jtihnzu 56 5 have have VB work_tsqcfpvhajcedozkby6jtihnzu 56 6 the the DT work_tsqcfpvhajcedozkby6jtihnzu 56 7 ability ability NN work_tsqcfpvhajcedozkby6jtihnzu 56 8 to to TO work_tsqcfpvhajcedozkby6jtihnzu 56 9 fight fight VB work_tsqcfpvhajcedozkby6jtihnzu 56 10 back back RB work_tsqcfpvhajcedozkby6jtihnzu 56 11 , , , work_tsqcfpvhajcedozkby6jtihnzu 56 12 to to TO work_tsqcfpvhajcedozkby6jtihnzu 56 13 prevent prevent VB work_tsqcfpvhajcedozkby6jtihnzu 56 14 or or CC work_tsqcfpvhajcedozkby6jtihnzu 56 15 even even RB work_tsqcfpvhajcedozkby6jtihnzu 56 16 destroy destroy VB work_tsqcfpvhajcedozkby6jtihnzu 56 17 the the DT work_tsqcfpvhajcedozkby6jtihnzu 56 18 invaders invader NNS work_tsqcfpvhajcedozkby6jtihnzu 56 19 ' ' POS work_tsqcfpvhajcedozkby6jtihnzu 56 20 attempt attempt NN work_tsqcfpvhajcedozkby6jtihnzu 56 21 . . . work_tsqcfpvhajcedozkby6jtihnzu 57 1 B. B. NNP work_tsqcfpvhajcedozkby6jtihnzu 58 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 58 2 Main Main NNP work_tsqcfpvhajcedozkby6jtihnzu 58 3 Contents Contents NNPS work_tsqcfpvhajcedozkby6jtihnzu 58 4 of of IN work_tsqcfpvhajcedozkby6jtihnzu 58 5 the the DT work_tsqcfpvhajcedozkby6jtihnzu 58 6 Network Network NNP work_tsqcfpvhajcedozkby6jtihnzu 58 7 Security Security NNP work_tsqcfpvhajcedozkby6jtihnzu 58 8 Plan Plan NNP work_tsqcfpvhajcedozkby6jtihnzu 58 9 The the DT work_tsqcfpvhajcedozkby6jtihnzu 58 10 security security NN work_tsqcfpvhajcedozkby6jtihnzu 58 11 of of IN work_tsqcfpvhajcedozkby6jtihnzu 58 12 information information NN work_tsqcfpvhajcedozkby6jtihnzu 58 13 network network NN work_tsqcfpvhajcedozkby6jtihnzu 58 14 issystem issystem NN work_tsqcfpvhajcedozkby6jtihnzu 58 15 engineering engineering NN work_tsqcfpvhajcedozkby6jtihnzu 58 16 . . . work_tsqcfpvhajcedozkby6jtihnzu 59 1 It -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 59 2 not not RB work_tsqcfpvhajcedozkby6jtihnzu 59 3 only only RB work_tsqcfpvhajcedozkby6jtihnzu 59 4 needs need VBZ work_tsqcfpvhajcedozkby6jtihnzu 59 5 solid solid JJ work_tsqcfpvhajcedozkby6jtihnzu 59 6 technical technical JJ work_tsqcfpvhajcedozkby6jtihnzu 59 7 support support NN work_tsqcfpvhajcedozkby6jtihnzu 59 8 , , , work_tsqcfpvhajcedozkby6jtihnzu 59 9 but but CC work_tsqcfpvhajcedozkby6jtihnzu 59 10 also also RB work_tsqcfpvhajcedozkby6jtihnzu 59 11 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 59 12 restricted restrict VBN work_tsqcfpvhajcedozkby6jtihnzu 59 13 by by IN work_tsqcfpvhajcedozkby6jtihnzu 59 14 many many JJ work_tsqcfpvhajcedozkby6jtihnzu 59 15 factors factor NNS work_tsqcfpvhajcedozkby6jtihnzu 59 16 , , , work_tsqcfpvhajcedozkby6jtihnzu 59 17 such such JJ work_tsqcfpvhajcedozkby6jtihnzu 59 18 as as IN work_tsqcfpvhajcedozkby6jtihnzu 59 19 staffing staffing NN work_tsqcfpvhajcedozkby6jtihnzu 59 20 , , , work_tsqcfpvhajcedozkby6jtihnzu 59 21 organization organization NN work_tsqcfpvhajcedozkby6jtihnzu 59 22 construction construction NN work_tsqcfpvhajcedozkby6jtihnzu 59 23 , , , work_tsqcfpvhajcedozkby6jtihnzu 59 24 management management NN work_tsqcfpvhajcedozkby6jtihnzu 59 25 level level NN work_tsqcfpvhajcedozkby6jtihnzu 59 26 , , , work_tsqcfpvhajcedozkby6jtihnzu 59 27 national national JJ work_tsqcfpvhajcedozkby6jtihnzu 59 28 legislation legislation NN work_tsqcfpvhajcedozkby6jtihnzu 59 29 and and CC work_tsqcfpvhajcedozkby6jtihnzu 59 30 so so RB work_tsqcfpvhajcedozkby6jtihnzu 59 31 on on RB work_tsqcfpvhajcedozkby6jtihnzu 59 32 . . . work_tsqcfpvhajcedozkby6jtihnzu 60 1 Therefore therefore RB work_tsqcfpvhajcedozkby6jtihnzu 60 2 , , , work_tsqcfpvhajcedozkby6jtihnzu 60 3 it -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 60 4 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 60 5 necessary necessary JJ work_tsqcfpvhajcedozkby6jtihnzu 60 6 to to TO work_tsqcfpvhajcedozkby6jtihnzu 60 7 formulate formulate VB work_tsqcfpvhajcedozkby6jtihnzu 60 8 Advances advance NNS work_tsqcfpvhajcedozkby6jtihnzu 60 9 in in IN work_tsqcfpvhajcedozkby6jtihnzu 60 10 Computer Computer NNP work_tsqcfpvhajcedozkby6jtihnzu 60 11 Science Science NNP work_tsqcfpvhajcedozkby6jtihnzu 60 12 Research Research NNP work_tsqcfpvhajcedozkby6jtihnzu 60 13 , , , work_tsqcfpvhajcedozkby6jtihnzu 60 14 volume volume NN work_tsqcfpvhajcedozkby6jtihnzu 60 15 79 79 CD work_tsqcfpvhajcedozkby6jtihnzu 60 16 217 217 CD work_tsqcfpvhajcedozkby6jtihnzu 60 17 a a DT work_tsqcfpvhajcedozkby6jtihnzu 60 18 feasible feasible JJ work_tsqcfpvhajcedozkby6jtihnzu 60 19 and and CC work_tsqcfpvhajcedozkby6jtihnzu 60 20 efficient efficient JJ work_tsqcfpvhajcedozkby6jtihnzu 60 21 network network NN work_tsqcfpvhajcedozkby6jtihnzu 60 22 security security NN work_tsqcfpvhajcedozkby6jtihnzu 60 23 plan plan NN work_tsqcfpvhajcedozkby6jtihnzu 60 24 according accord VBG work_tsqcfpvhajcedozkby6jtihnzu 60 25 to to IN work_tsqcfpvhajcedozkby6jtihnzu 60 26 the the DT work_tsqcfpvhajcedozkby6jtihnzu 60 27 objective objective NN work_tsqcfpvhajcedozkby6jtihnzu 60 28 of of IN work_tsqcfpvhajcedozkby6jtihnzu 60 29 the the DT work_tsqcfpvhajcedozkby6jtihnzu 60 30 all all RB work_tsqcfpvhajcedozkby6jtihnzu 60 31 - - HYPH work_tsqcfpvhajcedozkby6jtihnzu 60 32 round round JJ work_tsqcfpvhajcedozkby6jtihnzu 60 33 network network NN work_tsqcfpvhajcedozkby6jtihnzu 60 34 security security NN work_tsqcfpvhajcedozkby6jtihnzu 60 35 strategy strategy NN work_tsqcfpvhajcedozkby6jtihnzu 60 36 . . . work_tsqcfpvhajcedozkby6jtihnzu 61 1 We -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 61 2 should should MD work_tsqcfpvhajcedozkby6jtihnzu 61 3 reasonably reasonably RB work_tsqcfpvhajcedozkby6jtihnzu 61 4 allocate allocate VB work_tsqcfpvhajcedozkby6jtihnzu 61 5 all all DT work_tsqcfpvhajcedozkby6jtihnzu 61 6 kinds kind NNS work_tsqcfpvhajcedozkby6jtihnzu 61 7 of of IN work_tsqcfpvhajcedozkby6jtihnzu 61 8 resources resource NNS work_tsqcfpvhajcedozkby6jtihnzu 61 9 and and CC work_tsqcfpvhajcedozkby6jtihnzu 61 10 coordinate coordinate VB work_tsqcfpvhajcedozkby6jtihnzu 61 11 the the DT work_tsqcfpvhajcedozkby6jtihnzu 61 12 relations relation NNS work_tsqcfpvhajcedozkby6jtihnzu 61 13 in in IN work_tsqcfpvhajcedozkby6jtihnzu 61 14 all all DT work_tsqcfpvhajcedozkby6jtihnzu 61 15 aspects aspect NNS work_tsqcfpvhajcedozkby6jtihnzu 61 16 . . . work_tsqcfpvhajcedozkby6jtihnzu 62 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 62 2 plan plan NN work_tsqcfpvhajcedozkby6jtihnzu 62 3 mainly mainly RB work_tsqcfpvhajcedozkby6jtihnzu 62 4 includes include VBZ work_tsqcfpvhajcedozkby6jtihnzu 62 5 eight eight CD work_tsqcfpvhajcedozkby6jtihnzu 62 6 points point NNS work_tsqcfpvhajcedozkby6jtihnzu 62 7 : : : work_tsqcfpvhajcedozkby6jtihnzu 62 8 1 1 LS work_tsqcfpvhajcedozkby6jtihnzu 62 9 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 62 10 To to TO work_tsqcfpvhajcedozkby6jtihnzu 62 11 establish establish VB work_tsqcfpvhajcedozkby6jtihnzu 62 12 an an DT work_tsqcfpvhajcedozkby6jtihnzu 62 13 active active JJ work_tsqcfpvhajcedozkby6jtihnzu 62 14 defense defense NN work_tsqcfpvhajcedozkby6jtihnzu 62 15 system system NN work_tsqcfpvhajcedozkby6jtihnzu 62 16 . . . work_tsqcfpvhajcedozkby6jtihnzu 63 1 Identify identify VB work_tsqcfpvhajcedozkby6jtihnzu 63 2 key key JJ work_tsqcfpvhajcedozkby6jtihnzu 63 3 infrastructure infrastructure NN work_tsqcfpvhajcedozkby6jtihnzu 63 4 and and CC work_tsqcfpvhajcedozkby6jtihnzu 63 5 interdependence interdependence NN work_tsqcfpvhajcedozkby6jtihnzu 63 6 . . . work_tsqcfpvhajcedozkby6jtihnzu 64 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 64 2 software software NN work_tsqcfpvhajcedozkby6jtihnzu 64 3 and and CC work_tsqcfpvhajcedozkby6jtihnzu 64 4 hardware hardware NN work_tsqcfpvhajcedozkby6jtihnzu 64 5 of of IN work_tsqcfpvhajcedozkby6jtihnzu 64 6 the the DT work_tsqcfpvhajcedozkby6jtihnzu 64 7 network network NN work_tsqcfpvhajcedozkby6jtihnzu 64 8 system system NN work_tsqcfpvhajcedozkby6jtihnzu 64 9 , , , work_tsqcfpvhajcedozkby6jtihnzu 64 10 which which WDT work_tsqcfpvhajcedozkby6jtihnzu 64 11 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 64 12 the the DT work_tsqcfpvhajcedozkby6jtihnzu 64 13 carrier carrier NN work_tsqcfpvhajcedozkby6jtihnzu 64 14 of of IN work_tsqcfpvhajcedozkby6jtihnzu 64 15 information information NN work_tsqcfpvhajcedozkby6jtihnzu 64 16 dissemination dissemination NN work_tsqcfpvhajcedozkby6jtihnzu 64 17 , , , work_tsqcfpvhajcedozkby6jtihnzu 64 18 storage storage NN work_tsqcfpvhajcedozkby6jtihnzu 64 19 and and CC work_tsqcfpvhajcedozkby6jtihnzu 64 20 processing processing NN work_tsqcfpvhajcedozkby6jtihnzu 64 21 in in IN work_tsqcfpvhajcedozkby6jtihnzu 64 22 the the DT work_tsqcfpvhajcedozkby6jtihnzu 64 23 vulnerability vulnerability NN work_tsqcfpvhajcedozkby6jtihnzu 64 24 information information NN work_tsqcfpvhajcedozkby6jtihnzu 64 25 network network NN work_tsqcfpvhajcedozkby6jtihnzu 64 26 system system NN work_tsqcfpvhajcedozkby6jtihnzu 64 27 , , , work_tsqcfpvhajcedozkby6jtihnzu 64 28 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 64 29 an an DT work_tsqcfpvhajcedozkby6jtihnzu 64 30 important important JJ work_tsqcfpvhajcedozkby6jtihnzu 64 31 infrastructure infrastructure NN work_tsqcfpvhajcedozkby6jtihnzu 64 32 in in IN work_tsqcfpvhajcedozkby6jtihnzu 64 33 the the DT work_tsqcfpvhajcedozkby6jtihnzu 64 34 whole whole JJ work_tsqcfpvhajcedozkby6jtihnzu 64 35 system system NN work_tsqcfpvhajcedozkby6jtihnzu 64 36 . . . work_tsqcfpvhajcedozkby6jtihnzu 65 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 65 2 interdependence interdependence NN work_tsqcfpvhajcedozkby6jtihnzu 65 3 between between IN work_tsqcfpvhajcedozkby6jtihnzu 65 4 these these DT work_tsqcfpvhajcedozkby6jtihnzu 65 5 facilities facility NNS work_tsqcfpvhajcedozkby6jtihnzu 65 6 , , , work_tsqcfpvhajcedozkby6jtihnzu 65 7 especially especially RB work_tsqcfpvhajcedozkby6jtihnzu 65 8 the the DT work_tsqcfpvhajcedozkby6jtihnzu 65 9 key key JJ work_tsqcfpvhajcedozkby6jtihnzu 65 10 infrastructure infrastructure NN work_tsqcfpvhajcedozkby6jtihnzu 65 11 , , , work_tsqcfpvhajcedozkby6jtihnzu 65 12 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 65 13 given give VBN work_tsqcfpvhajcedozkby6jtihnzu 65 14 full full JJ work_tsqcfpvhajcedozkby6jtihnzu 65 15 attention attention NN work_tsqcfpvhajcedozkby6jtihnzu 65 16 . . . work_tsqcfpvhajcedozkby6jtihnzu 66 1 It -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 66 2 also also RB work_tsqcfpvhajcedozkby6jtihnzu 66 3 conducts conduct VBZ work_tsqcfpvhajcedozkby6jtihnzu 66 4 continuous continuous JJ work_tsqcfpvhajcedozkby6jtihnzu 66 5 vulnerability vulnerability NN work_tsqcfpvhajcedozkby6jtihnzu 66 6 assessment assessment NN work_tsqcfpvhajcedozkby6jtihnzu 66 7 and and CC work_tsqcfpvhajcedozkby6jtihnzu 66 8 audit audit NN work_tsqcfpvhajcedozkby6jtihnzu 66 9 of of IN work_tsqcfpvhajcedozkby6jtihnzu 66 10 the the DT work_tsqcfpvhajcedozkby6jtihnzu 66 11 software software NN work_tsqcfpvhajcedozkby6jtihnzu 66 12 and and CC work_tsqcfpvhajcedozkby6jtihnzu 66 13 hardware hardware NN work_tsqcfpvhajcedozkby6jtihnzu 66 14 systems system NNS work_tsqcfpvhajcedozkby6jtihnzu 66 15 used use VBN work_tsqcfpvhajcedozkby6jtihnzu 66 16 in in IN work_tsqcfpvhajcedozkby6jtihnzu 66 17 the the DT work_tsqcfpvhajcedozkby6jtihnzu 66 18 network network NN work_tsqcfpvhajcedozkby6jtihnzu 66 19 . . . work_tsqcfpvhajcedozkby6jtihnzu 67 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 67 2 ability ability NN work_tsqcfpvhajcedozkby6jtihnzu 67 3 of of IN work_tsqcfpvhajcedozkby6jtihnzu 67 4 the the DT work_tsqcfpvhajcedozkby6jtihnzu 67 5 invaders invader NNS work_tsqcfpvhajcedozkby6jtihnzu 67 6 to to TO work_tsqcfpvhajcedozkby6jtihnzu 67 7 destroy destroy VB work_tsqcfpvhajcedozkby6jtihnzu 67 8 the the DT work_tsqcfpvhajcedozkby6jtihnzu 67 9 critical critical JJ work_tsqcfpvhajcedozkby6jtihnzu 67 10 infrastructure infrastructure NN work_tsqcfpvhajcedozkby6jtihnzu 67 11 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 67 12 estimated estimate VBN work_tsqcfpvhajcedozkby6jtihnzu 67 13 . . . work_tsqcfpvhajcedozkby6jtihnzu 68 1 Develop develop VB work_tsqcfpvhajcedozkby6jtihnzu 68 2 a a DT work_tsqcfpvhajcedozkby6jtihnzu 68 3 practical practical JJ work_tsqcfpvhajcedozkby6jtihnzu 68 4 scheme scheme NN work_tsqcfpvhajcedozkby6jtihnzu 68 5 to to TO work_tsqcfpvhajcedozkby6jtihnzu 68 6 repair repair VB work_tsqcfpvhajcedozkby6jtihnzu 68 7 the the DT work_tsqcfpvhajcedozkby6jtihnzu 68 8 vulnerability vulnerability NN work_tsqcfpvhajcedozkby6jtihnzu 68 9 of of IN work_tsqcfpvhajcedozkby6jtihnzu 68 10 the the DT work_tsqcfpvhajcedozkby6jtihnzu 68 11 system system NN work_tsqcfpvhajcedozkby6jtihnzu 68 12 and and CC work_tsqcfpvhajcedozkby6jtihnzu 68 13 constantly constantly RB work_tsqcfpvhajcedozkby6jtihnzu 68 14 modify modify VB work_tsqcfpvhajcedozkby6jtihnzu 68 15 and and CC work_tsqcfpvhajcedozkby6jtihnzu 68 16 update update VB work_tsqcfpvhajcedozkby6jtihnzu 68 17 the the DT work_tsqcfpvhajcedozkby6jtihnzu 68 18 scheme scheme NN work_tsqcfpvhajcedozkby6jtihnzu 68 19 . . . work_tsqcfpvhajcedozkby6jtihnzu 69 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 69 2 evaluation evaluation NN work_tsqcfpvhajcedozkby6jtihnzu 69 3 and and CC work_tsqcfpvhajcedozkby6jtihnzu 69 4 audit audit NN work_tsqcfpvhajcedozkby6jtihnzu 69 5 work work NN work_tsqcfpvhajcedozkby6jtihnzu 69 6 will will MD work_tsqcfpvhajcedozkby6jtihnzu 69 7 effectively effectively RB work_tsqcfpvhajcedozkby6jtihnzu 69 8 destroy destroy VB work_tsqcfpvhajcedozkby6jtihnzu 69 9 the the DT work_tsqcfpvhajcedozkby6jtihnzu 69 10 invaders invader NNS work_tsqcfpvhajcedozkby6jtihnzu 69 11 ' ' POS work_tsqcfpvhajcedozkby6jtihnzu 69 12 attempt attempt NN work_tsqcfpvhajcedozkby6jtihnzu 69 13 , , , work_tsqcfpvhajcedozkby6jtihnzu 69 14 which which WDT work_tsqcfpvhajcedozkby6jtihnzu 69 15 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 69 16 bound bind VBN work_tsqcfpvhajcedozkby6jtihnzu 69 17 to to TO work_tsqcfpvhajcedozkby6jtihnzu 69 18 be be VB work_tsqcfpvhajcedozkby6jtihnzu 69 19 the the DT work_tsqcfpvhajcedozkby6jtihnzu 69 20 target target NN work_tsqcfpvhajcedozkby6jtihnzu 69 21 of of IN work_tsqcfpvhajcedozkby6jtihnzu 69 22 the the DT work_tsqcfpvhajcedozkby6jtihnzu 69 23 invaders invader NNS work_tsqcfpvhajcedozkby6jtihnzu 69 24 to to TO work_tsqcfpvhajcedozkby6jtihnzu 69 25 carry carry VB work_tsqcfpvhajcedozkby6jtihnzu 69 26 out out RP work_tsqcfpvhajcedozkby6jtihnzu 69 27 the the DT work_tsqcfpvhajcedozkby6jtihnzu 69 28 attack attack NN work_tsqcfpvhajcedozkby6jtihnzu 69 29 . . . work_tsqcfpvhajcedozkby6jtihnzu 70 1 Therefore therefore RB work_tsqcfpvhajcedozkby6jtihnzu 70 2 , , , work_tsqcfpvhajcedozkby6jtihnzu 70 3 enough enough JJ work_tsqcfpvhajcedozkby6jtihnzu 70 4 attention attention NN work_tsqcfpvhajcedozkby6jtihnzu 70 5 should should MD work_tsqcfpvhajcedozkby6jtihnzu 70 6 be be VB work_tsqcfpvhajcedozkby6jtihnzu 70 7 given give VBN work_tsqcfpvhajcedozkby6jtihnzu 70 8 to to IN work_tsqcfpvhajcedozkby6jtihnzu 70 9 the the DT work_tsqcfpvhajcedozkby6jtihnzu 70 10 safety safety NN work_tsqcfpvhajcedozkby6jtihnzu 70 11 of of IN work_tsqcfpvhajcedozkby6jtihnzu 70 12 the the DT work_tsqcfpvhajcedozkby6jtihnzu 70 13 assessment assessment NN work_tsqcfpvhajcedozkby6jtihnzu 70 14 and and CC work_tsqcfpvhajcedozkby6jtihnzu 70 15 audit audit NN work_tsqcfpvhajcedozkby6jtihnzu 70 16 work work NN work_tsqcfpvhajcedozkby6jtihnzu 70 17 itself -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 70 18 . . . work_tsqcfpvhajcedozkby6jtihnzu 71 1 2 2 LS work_tsqcfpvhajcedozkby6jtihnzu 71 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 71 3 Detection detection NN work_tsqcfpvhajcedozkby6jtihnzu 71 4 of of IN work_tsqcfpvhajcedozkby6jtihnzu 71 5 attacks attack NNS work_tsqcfpvhajcedozkby6jtihnzu 71 6 and and CC work_tsqcfpvhajcedozkby6jtihnzu 71 7 illegal illegal JJ work_tsqcfpvhajcedozkby6jtihnzu 71 8 intrusion intrusion NN work_tsqcfpvhajcedozkby6jtihnzu 71 9 , , , work_tsqcfpvhajcedozkby6jtihnzu 71 10 and and CC work_tsqcfpvhajcedozkby6jtihnzu 71 11 pay pay VB work_tsqcfpvhajcedozkby6jtihnzu 71 12 attention attention NN work_tsqcfpvhajcedozkby6jtihnzu 71 13 to to IN work_tsqcfpvhajcedozkby6jtihnzu 71 14 the the DT work_tsqcfpvhajcedozkby6jtihnzu 71 15 collection collection NN work_tsqcfpvhajcedozkby6jtihnzu 71 16 of of IN work_tsqcfpvhajcedozkby6jtihnzu 71 17 network network NN work_tsqcfpvhajcedozkby6jtihnzu 71 18 security security NN work_tsqcfpvhajcedozkby6jtihnzu 71 19 information information NN work_tsqcfpvhajcedozkby6jtihnzu 71 20 . . . work_tsqcfpvhajcedozkby6jtihnzu 72 1 Acknowledgement acknowledgement NN work_tsqcfpvhajcedozkby6jtihnzu 72 2 and and CC work_tsqcfpvhajcedozkby6jtihnzu 72 3 correction correction NN work_tsqcfpvhajcedozkby6jtihnzu 72 4 of of IN work_tsqcfpvhajcedozkby6jtihnzu 72 5 vulnerability vulnerability NN work_tsqcfpvhajcedozkby6jtihnzu 72 6 can can MD work_tsqcfpvhajcedozkby6jtihnzu 72 7 delay delay VB work_tsqcfpvhajcedozkby6jtihnzu 72 8 but but CC work_tsqcfpvhajcedozkby6jtihnzu 72 9 not not RB work_tsqcfpvhajcedozkby6jtihnzu 72 10 completely completely RB work_tsqcfpvhajcedozkby6jtihnzu 72 11 prevent prevent VB work_tsqcfpvhajcedozkby6jtihnzu 72 12 malicious malicious JJ work_tsqcfpvhajcedozkby6jtihnzu 72 13 intrusion intrusion NN work_tsqcfpvhajcedozkby6jtihnzu 72 14 to to IN work_tsqcfpvhajcedozkby6jtihnzu 72 15 the the DT work_tsqcfpvhajcedozkby6jtihnzu 72 16 information information NN work_tsqcfpvhajcedozkby6jtihnzu 72 17 network network NN work_tsqcfpvhajcedozkby6jtihnzu 72 18 system system NN work_tsqcfpvhajcedozkby6jtihnzu 72 19 . . . work_tsqcfpvhajcedozkby6jtihnzu 73 1 Therefore therefore RB work_tsqcfpvhajcedozkby6jtihnzu 73 2 , , , work_tsqcfpvhajcedozkby6jtihnzu 73 3 we -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 73 4 need need VBP work_tsqcfpvhajcedozkby6jtihnzu 73 5 to to TO work_tsqcfpvhajcedozkby6jtihnzu 73 6 carry carry VB work_tsqcfpvhajcedozkby6jtihnzu 73 7 out out RP work_tsqcfpvhajcedozkby6jtihnzu 73 8 active active JJ work_tsqcfpvhajcedozkby6jtihnzu 73 9 defense defense NN work_tsqcfpvhajcedozkby6jtihnzu 73 10 at at IN work_tsqcfpvhajcedozkby6jtihnzu 73 11 all all DT work_tsqcfpvhajcedozkby6jtihnzu 73 12 levels level NNS work_tsqcfpvhajcedozkby6jtihnzu 73 13 of of IN work_tsqcfpvhajcedozkby6jtihnzu 73 14 information information NN work_tsqcfpvhajcedozkby6jtihnzu 73 15 network network NN work_tsqcfpvhajcedozkby6jtihnzu 73 16 system system NN work_tsqcfpvhajcedozkby6jtihnzu 73 17 , , , work_tsqcfpvhajcedozkby6jtihnzu 73 18 install install NN work_tsqcfpvhajcedozkby6jtihnzu 73 19 and and CC work_tsqcfpvhajcedozkby6jtihnzu 73 20 configure configure NN work_tsqcfpvhajcedozkby6jtihnzu 73 21 intrusion intrusion NN work_tsqcfpvhajcedozkby6jtihnzu 73 22 detection detection NN work_tsqcfpvhajcedozkby6jtihnzu 73 23 system system NN work_tsqcfpvhajcedozkby6jtihnzu 73 24 , , , work_tsqcfpvhajcedozkby6jtihnzu 73 25 vulnerability vulnerability NN work_tsqcfpvhajcedozkby6jtihnzu 73 26 scanning scanning NN work_tsqcfpvhajcedozkby6jtihnzu 73 27 system system NN work_tsqcfpvhajcedozkby6jtihnzu 73 28 , , , work_tsqcfpvhajcedozkby6jtihnzu 73 29 emergency emergency NN work_tsqcfpvhajcedozkby6jtihnzu 73 30 response response NN work_tsqcfpvhajcedozkby6jtihnzu 73 31 system system NN work_tsqcfpvhajcedozkby6jtihnzu 73 32 and and CC work_tsqcfpvhajcedozkby6jtihnzu 73 33 so so RB work_tsqcfpvhajcedozkby6jtihnzu 73 34 on on RB work_tsqcfpvhajcedozkby6jtihnzu 73 35 . . . work_tsqcfpvhajcedozkby6jtihnzu 74 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 74 2 network network NN work_tsqcfpvhajcedozkby6jtihnzu 74 3 management management NN work_tsqcfpvhajcedozkby6jtihnzu 74 4 department department NN work_tsqcfpvhajcedozkby6jtihnzu 74 5 should should MD work_tsqcfpvhajcedozkby6jtihnzu 74 6 always always RB work_tsqcfpvhajcedozkby6jtihnzu 74 7 pay pay VB work_tsqcfpvhajcedozkby6jtihnzu 74 8 attention attention NN work_tsqcfpvhajcedozkby6jtihnzu 74 9 to to IN work_tsqcfpvhajcedozkby6jtihnzu 74 10 the the DT work_tsqcfpvhajcedozkby6jtihnzu 74 11 collection collection NN work_tsqcfpvhajcedozkby6jtihnzu 74 12 of of IN work_tsqcfpvhajcedozkby6jtihnzu 74 13 network network NN work_tsqcfpvhajcedozkby6jtihnzu 74 14 security security NN work_tsqcfpvhajcedozkby6jtihnzu 74 15 information information NN work_tsqcfpvhajcedozkby6jtihnzu 74 16 , , , work_tsqcfpvhajcedozkby6jtihnzu 74 17 help help VB work_tsqcfpvhajcedozkby6jtihnzu 74 18 the the DT work_tsqcfpvhajcedozkby6jtihnzu 74 19 end end NN work_tsqcfpvhajcedozkby6jtihnzu 74 20 users user NNS work_tsqcfpvhajcedozkby6jtihnzu 74 21 to to TO work_tsqcfpvhajcedozkby6jtihnzu 74 22 resist resist VB work_tsqcfpvhajcedozkby6jtihnzu 74 23 attacks attack NNS work_tsqcfpvhajcedozkby6jtihnzu 74 24 and and CC work_tsqcfpvhajcedozkby6jtihnzu 74 25 prevent prevent VB work_tsqcfpvhajcedozkby6jtihnzu 74 26 virus virus NN work_tsqcfpvhajcedozkby6jtihnzu 74 27 invasion invasion NN work_tsqcfpvhajcedozkby6jtihnzu 74 28 . . . work_tsqcfpvhajcedozkby6jtihnzu 75 1 Establish establish VB work_tsqcfpvhajcedozkby6jtihnzu 75 2 security security NN work_tsqcfpvhajcedozkby6jtihnzu 75 3 management management NN work_tsqcfpvhajcedozkby6jtihnzu 75 4 organization organization NN work_tsqcfpvhajcedozkby6jtihnzu 75 5 according accord VBG work_tsqcfpvhajcedozkby6jtihnzu 75 6 to to IN work_tsqcfpvhajcedozkby6jtihnzu 75 7 the the DT work_tsqcfpvhajcedozkby6jtihnzu 75 8 network network NN work_tsqcfpvhajcedozkby6jtihnzu 75 9 operation operation NN work_tsqcfpvhajcedozkby6jtihnzu 75 10 situation situation NN work_tsqcfpvhajcedozkby6jtihnzu 75 11 . . . work_tsqcfpvhajcedozkby6jtihnzu 76 1 a a LS work_tsqcfpvhajcedozkby6jtihnzu 76 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 76 3 Safety safety NN work_tsqcfpvhajcedozkby6jtihnzu 76 4 management management NN work_tsqcfpvhajcedozkby6jtihnzu 76 5 group group NN work_tsqcfpvhajcedozkby6jtihnzu 76 6 . . . work_tsqcfpvhajcedozkby6jtihnzu 77 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 77 2 Group Group NNP work_tsqcfpvhajcedozkby6jtihnzu 77 3 monitors monitor NNS work_tsqcfpvhajcedozkby6jtihnzu 77 4 and and CC work_tsqcfpvhajcedozkby6jtihnzu 77 5 manages manage VBZ work_tsqcfpvhajcedozkby6jtihnzu 77 6 the the DT work_tsqcfpvhajcedozkby6jtihnzu 77 7 entire entire JJ work_tsqcfpvhajcedozkby6jtihnzu 77 8 network network NN work_tsqcfpvhajcedozkby6jtihnzu 77 9 system system NN work_tsqcfpvhajcedozkby6jtihnzu 77 10 and and CC work_tsqcfpvhajcedozkby6jtihnzu 77 11 coordinates coordinate VBZ work_tsqcfpvhajcedozkby6jtihnzu 77 12 the the DT work_tsqcfpvhajcedozkby6jtihnzu 77 13 work work NN work_tsqcfpvhajcedozkby6jtihnzu 77 14 of of IN work_tsqcfpvhajcedozkby6jtihnzu 77 15 the the DT work_tsqcfpvhajcedozkby6jtihnzu 77 16 group group NN work_tsqcfpvhajcedozkby6jtihnzu 77 17 and and CC work_tsqcfpvhajcedozkby6jtihnzu 77 18 other other JJ work_tsqcfpvhajcedozkby6jtihnzu 77 19 groups group NNS work_tsqcfpvhajcedozkby6jtihnzu 77 20 . . . work_tsqcfpvhajcedozkby6jtihnzu 78 1 When when WRB work_tsqcfpvhajcedozkby6jtihnzu 78 2 attacked attack VBN work_tsqcfpvhajcedozkby6jtihnzu 78 3 , , , work_tsqcfpvhajcedozkby6jtihnzu 78 4 the the DT work_tsqcfpvhajcedozkby6jtihnzu 78 5 system system NN work_tsqcfpvhajcedozkby6jtihnzu 78 6 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 78 7 resumed resume VBN work_tsqcfpvhajcedozkby6jtihnzu 78 8 with with IN work_tsqcfpvhajcedozkby6jtihnzu 78 9 the the DT work_tsqcfpvhajcedozkby6jtihnzu 78 10 other other JJ work_tsqcfpvhajcedozkby6jtihnzu 78 11 groups group NNS work_tsqcfpvhajcedozkby6jtihnzu 78 12 . . . work_tsqcfpvhajcedozkby6jtihnzu 79 1 b b LS work_tsqcfpvhajcedozkby6jtihnzu 79 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 79 3 Emergency emergency NN work_tsqcfpvhajcedozkby6jtihnzu 79 4 response response NN work_tsqcfpvhajcedozkby6jtihnzu 79 5 team team NN work_tsqcfpvhajcedozkby6jtihnzu 79 6 . . . work_tsqcfpvhajcedozkby6jtihnzu 80 1 Responsible responsible JJ work_tsqcfpvhajcedozkby6jtihnzu 80 2 for for IN work_tsqcfpvhajcedozkby6jtihnzu 80 3 security security NN work_tsqcfpvhajcedozkby6jtihnzu 80 4 technology technology NN work_tsqcfpvhajcedozkby6jtihnzu 80 5 research research NN work_tsqcfpvhajcedozkby6jtihnzu 80 6 and and CC work_tsqcfpvhajcedozkby6jtihnzu 80 7 development development NN work_tsqcfpvhajcedozkby6jtihnzu 80 8 , , , work_tsqcfpvhajcedozkby6jtihnzu 80 9 providing provide VBG work_tsqcfpvhajcedozkby6jtihnzu 80 10 expert expert JJ work_tsqcfpvhajcedozkby6jtihnzu 80 11 help help NN work_tsqcfpvhajcedozkby6jtihnzu 80 12 to to IN work_tsqcfpvhajcedozkby6jtihnzu 80 13 other other JJ work_tsqcfpvhajcedozkby6jtihnzu 80 14 groups group NNS work_tsqcfpvhajcedozkby6jtihnzu 80 15 to to TO work_tsqcfpvhajcedozkby6jtihnzu 80 16 help help VB work_tsqcfpvhajcedozkby6jtihnzu 80 17 them -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 80 18 isolate isolate VB work_tsqcfpvhajcedozkby6jtihnzu 80 19 , , , work_tsqcfpvhajcedozkby6jtihnzu 80 20 control control NN work_tsqcfpvhajcedozkby6jtihnzu 80 21 , , , work_tsqcfpvhajcedozkby6jtihnzu 80 22 and and CC work_tsqcfpvhajcedozkby6jtihnzu 80 23 resolve resolve VB work_tsqcfpvhajcedozkby6jtihnzu 80 24 intrusion intrusion NN work_tsqcfpvhajcedozkby6jtihnzu 80 25 and and CC work_tsqcfpvhajcedozkby6jtihnzu 80 26 attacks attack NNS work_tsqcfpvhajcedozkby6jtihnzu 80 27 . . . work_tsqcfpvhajcedozkby6jtihnzu 81 1 In in IN work_tsqcfpvhajcedozkby6jtihnzu 81 2 the the DT work_tsqcfpvhajcedozkby6jtihnzu 81 3 case case NN work_tsqcfpvhajcedozkby6jtihnzu 81 4 of of IN work_tsqcfpvhajcedozkby6jtihnzu 81 5 attack attack NN work_tsqcfpvhajcedozkby6jtihnzu 81 6 , , , work_tsqcfpvhajcedozkby6jtihnzu 81 7 it -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 81 8 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 81 9 able able JJ work_tsqcfpvhajcedozkby6jtihnzu 81 10 to to TO work_tsqcfpvhajcedozkby6jtihnzu 81 11 respond respond VB work_tsqcfpvhajcedozkby6jtihnzu 81 12 quickly quickly RB work_tsqcfpvhajcedozkby6jtihnzu 81 13 and and CC work_tsqcfpvhajcedozkby6jtihnzu 81 14 provide provide VB work_tsqcfpvhajcedozkby6jtihnzu 81 15 solutions solution NNS work_tsqcfpvhajcedozkby6jtihnzu 81 16 . . . work_tsqcfpvhajcedozkby6jtihnzu 82 1 c c LS work_tsqcfpvhajcedozkby6jtihnzu 82 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 82 3 Intrusion intrusion NN work_tsqcfpvhajcedozkby6jtihnzu 82 4 detection detection NN work_tsqcfpvhajcedozkby6jtihnzu 82 5 team team NN work_tsqcfpvhajcedozkby6jtihnzu 82 6 . . . work_tsqcfpvhajcedozkby6jtihnzu 83 1 It -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 83 2 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 83 3 responsible responsible JJ work_tsqcfpvhajcedozkby6jtihnzu 83 4 for for IN work_tsqcfpvhajcedozkby6jtihnzu 83 5 uninterrupted uninterrupted JJ work_tsqcfpvhajcedozkby6jtihnzu 83 6 network network NN work_tsqcfpvhajcedozkby6jtihnzu 83 7 security security NN work_tsqcfpvhajcedozkby6jtihnzu 83 8 detection detection NN work_tsqcfpvhajcedozkby6jtihnzu 83 9 , , , work_tsqcfpvhajcedozkby6jtihnzu 83 10 and and CC work_tsqcfpvhajcedozkby6jtihnzu 83 11 to to TO work_tsqcfpvhajcedozkby6jtihnzu 83 12 collect collect VB work_tsqcfpvhajcedozkby6jtihnzu 83 13 security security NN work_tsqcfpvhajcedozkby6jtihnzu 83 14 information information NN work_tsqcfpvhajcedozkby6jtihnzu 83 15 legally legally RB work_tsqcfpvhajcedozkby6jtihnzu 83 16 , , , work_tsqcfpvhajcedozkby6jtihnzu 83 17 and and CC work_tsqcfpvhajcedozkby6jtihnzu 83 18 provide provide VB work_tsqcfpvhajcedozkby6jtihnzu 83 19 security security NN work_tsqcfpvhajcedozkby6jtihnzu 83 20 information information NN work_tsqcfpvhajcedozkby6jtihnzu 83 21 for for IN work_tsqcfpvhajcedozkby6jtihnzu 83 22 other other JJ work_tsqcfpvhajcedozkby6jtihnzu 83 23 groups group NNS work_tsqcfpvhajcedozkby6jtihnzu 83 24 at at IN work_tsqcfpvhajcedozkby6jtihnzu 83 25 any any DT work_tsqcfpvhajcedozkby6jtihnzu 83 26 time time NN work_tsqcfpvhajcedozkby6jtihnzu 83 27 . . . work_tsqcfpvhajcedozkby6jtihnzu 84 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 84 2 system system NN work_tsqcfpvhajcedozkby6jtihnzu 84 3 backup backup NN work_tsqcfpvhajcedozkby6jtihnzu 84 4 work work NN work_tsqcfpvhajcedozkby6jtihnzu 84 5 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 84 6 done do VBN work_tsqcfpvhajcedozkby6jtihnzu 84 7 in in IN work_tsqcfpvhajcedozkby6jtihnzu 84 8 collaboration collaboration NN work_tsqcfpvhajcedozkby6jtihnzu 84 9 with with IN work_tsqcfpvhajcedozkby6jtihnzu 84 10 the the DT work_tsqcfpvhajcedozkby6jtihnzu 84 11 operation operation NN work_tsqcfpvhajcedozkby6jtihnzu 84 12 Department Department NNP work_tsqcfpvhajcedozkby6jtihnzu 84 13 to to TO work_tsqcfpvhajcedozkby6jtihnzu 84 14 support support VB work_tsqcfpvhajcedozkby6jtihnzu 84 15 the the DT work_tsqcfpvhajcedozkby6jtihnzu 84 16 recovery recovery NN work_tsqcfpvhajcedozkby6jtihnzu 84 17 work work NN work_tsqcfpvhajcedozkby6jtihnzu 84 18 after after IN work_tsqcfpvhajcedozkby6jtihnzu 84 19 the the DT work_tsqcfpvhajcedozkby6jtihnzu 84 20 attack attack NN work_tsqcfpvhajcedozkby6jtihnzu 84 21 . . . work_tsqcfpvhajcedozkby6jtihnzu 85 1 3 3 LS work_tsqcfpvhajcedozkby6jtihnzu 85 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 85 3 Improve improve VB work_tsqcfpvhajcedozkby6jtihnzu 85 4 fast fast JJ work_tsqcfpvhajcedozkby6jtihnzu 85 5 response response NN work_tsqcfpvhajcedozkby6jtihnzu 85 6 and and CC work_tsqcfpvhajcedozkby6jtihnzu 85 7 resilience resilience NN work_tsqcfpvhajcedozkby6jtihnzu 85 8 Response response NN work_tsqcfpvhajcedozkby6jtihnzu 85 9 and and CC work_tsqcfpvhajcedozkby6jtihnzu 85 10 recovery recovery NN work_tsqcfpvhajcedozkby6jtihnzu 85 11 plans plan NNS work_tsqcfpvhajcedozkby6jtihnzu 85 12 are be VBP work_tsqcfpvhajcedozkby6jtihnzu 85 13 formulated formulate VBN work_tsqcfpvhajcedozkby6jtihnzu 85 14 in in IN work_tsqcfpvhajcedozkby6jtihnzu 85 15 each each DT work_tsqcfpvhajcedozkby6jtihnzu 85 16 key key JJ work_tsqcfpvhajcedozkby6jtihnzu 85 17 infrastructure infrastructure NN work_tsqcfpvhajcedozkby6jtihnzu 85 18 and and CC work_tsqcfpvhajcedozkby6jtihnzu 85 19 key key JJ work_tsqcfpvhajcedozkby6jtihnzu 85 20 information information NN work_tsqcfpvhajcedozkby6jtihnzu 85 21 of of IN work_tsqcfpvhajcedozkby6jtihnzu 85 22 each each DT work_tsqcfpvhajcedozkby6jtihnzu 85 23 category category NN work_tsqcfpvhajcedozkby6jtihnzu 85 24 in in IN work_tsqcfpvhajcedozkby6jtihnzu 85 25 the the DT work_tsqcfpvhajcedozkby6jtihnzu 85 26 system system NN work_tsqcfpvhajcedozkby6jtihnzu 85 27 . . . work_tsqcfpvhajcedozkby6jtihnzu 86 1 In in IN work_tsqcfpvhajcedozkby6jtihnzu 86 2 the the DT work_tsqcfpvhajcedozkby6jtihnzu 86 3 case case NN work_tsqcfpvhajcedozkby6jtihnzu 86 4 of of IN work_tsqcfpvhajcedozkby6jtihnzu 86 5 attack attack NN work_tsqcfpvhajcedozkby6jtihnzu 86 6 , , , work_tsqcfpvhajcedozkby6jtihnzu 86 7 it -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 86 8 can can MD work_tsqcfpvhajcedozkby6jtihnzu 86 9 be be VB work_tsqcfpvhajcedozkby6jtihnzu 86 10 controlled control VBN work_tsqcfpvhajcedozkby6jtihnzu 86 11 in in IN work_tsqcfpvhajcedozkby6jtihnzu 86 12 time time NN work_tsqcfpvhajcedozkby6jtihnzu 86 13 , , , work_tsqcfpvhajcedozkby6jtihnzu 86 14 at at IN work_tsqcfpvhajcedozkby6jtihnzu 86 15 least least JJS work_tsqcfpvhajcedozkby6jtihnzu 86 16 to to TO work_tsqcfpvhajcedozkby6jtihnzu 86 17 ensure ensure VB work_tsqcfpvhajcedozkby6jtihnzu 86 18 the the DT work_tsqcfpvhajcedozkby6jtihnzu 86 19 minimum minimum JJ work_tsqcfpvhajcedozkby6jtihnzu 86 20 operation operation NN work_tsqcfpvhajcedozkby6jtihnzu 86 21 of of IN work_tsqcfpvhajcedozkby6jtihnzu 86 22 the the DT work_tsqcfpvhajcedozkby6jtihnzu 86 23 network network NN work_tsqcfpvhajcedozkby6jtihnzu 86 24 , , , work_tsqcfpvhajcedozkby6jtihnzu 86 25 so so IN work_tsqcfpvhajcedozkby6jtihnzu 86 26 that that IN work_tsqcfpvhajcedozkby6jtihnzu 86 27 the the DT work_tsqcfpvhajcedozkby6jtihnzu 86 28 work work NN work_tsqcfpvhajcedozkby6jtihnzu 86 29 of of IN work_tsqcfpvhajcedozkby6jtihnzu 86 30 other other JJ work_tsqcfpvhajcedozkby6jtihnzu 86 31 departments department NNS work_tsqcfpvhajcedozkby6jtihnzu 86 32 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 86 33 less less RBR work_tsqcfpvhajcedozkby6jtihnzu 86 34 affected affected JJ work_tsqcfpvhajcedozkby6jtihnzu 86 35 . . . work_tsqcfpvhajcedozkby6jtihnzu 87 1 When when WRB work_tsqcfpvhajcedozkby6jtihnzu 87 2 an an DT work_tsqcfpvhajcedozkby6jtihnzu 87 3 attack attack NN work_tsqcfpvhajcedozkby6jtihnzu 87 4 occurs occur VBZ work_tsqcfpvhajcedozkby6jtihnzu 87 5 , , , work_tsqcfpvhajcedozkby6jtihnzu 87 6 the the DT work_tsqcfpvhajcedozkby6jtihnzu 87 7 response response NN work_tsqcfpvhajcedozkby6jtihnzu 87 8 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 87 9 as as IN work_tsqcfpvhajcedozkby6jtihnzu 87 10 follows follow VBZ work_tsqcfpvhajcedozkby6jtihnzu 87 11 : : : work_tsqcfpvhajcedozkby6jtihnzu 87 12 a a LS work_tsqcfpvhajcedozkby6jtihnzu 87 13 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 87 14 The the DT work_tsqcfpvhajcedozkby6jtihnzu 87 15 rapid rapid JJ work_tsqcfpvhajcedozkby6jtihnzu 87 16 control control NN work_tsqcfpvhajcedozkby6jtihnzu 87 17 of of IN work_tsqcfpvhajcedozkby6jtihnzu 87 18 the the DT work_tsqcfpvhajcedozkby6jtihnzu 87 19 intruders intruder NNS work_tsqcfpvhajcedozkby6jtihnzu 87 20 and and CC work_tsqcfpvhajcedozkby6jtihnzu 87 21 blocking block VBG work_tsqcfpvhajcedozkby6jtihnzu 87 22 the the DT work_tsqcfpvhajcedozkby6jtihnzu 87 23 access access NN work_tsqcfpvhajcedozkby6jtihnzu 87 24 to to IN work_tsqcfpvhajcedozkby6jtihnzu 87 25 the the DT work_tsqcfpvhajcedozkby6jtihnzu 87 26 system system NN work_tsqcfpvhajcedozkby6jtihnzu 87 27 . . . work_tsqcfpvhajcedozkby6jtihnzu 88 1 b b LS work_tsqcfpvhajcedozkby6jtihnzu 88 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 88 3 Other other JJ work_tsqcfpvhajcedozkby6jtihnzu 88 4 more more RBR work_tsqcfpvhajcedozkby6jtihnzu 88 5 stringent stringent JJ work_tsqcfpvhajcedozkby6jtihnzu 88 6 defense defense NN work_tsqcfpvhajcedozkby6jtihnzu 88 7 measures measure NNS work_tsqcfpvhajcedozkby6jtihnzu 88 8 are be VBP work_tsqcfpvhajcedozkby6jtihnzu 88 9 quickly quickly RB work_tsqcfpvhajcedozkby6jtihnzu 88 10 launched launch VBN work_tsqcfpvhajcedozkby6jtihnzu 88 11 . . . work_tsqcfpvhajcedozkby6jtihnzu 89 1 c c LS work_tsqcfpvhajcedozkby6jtihnzu 89 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 89 3 Close close VB work_tsqcfpvhajcedozkby6jtihnzu 89 4 the the DT work_tsqcfpvhajcedozkby6jtihnzu 89 5 non non JJ work_tsqcfpvhajcedozkby6jtihnzu 89 6 - - JJ work_tsqcfpvhajcedozkby6jtihnzu 89 7 critical critical JJ work_tsqcfpvhajcedozkby6jtihnzu 89 8 operating operating NN work_tsqcfpvhajcedozkby6jtihnzu 89 9 system system NN work_tsqcfpvhajcedozkby6jtihnzu 89 10 . . . work_tsqcfpvhajcedozkby6jtihnzu 90 1 d d LS work_tsqcfpvhajcedozkby6jtihnzu 90 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 90 3 To to TO work_tsqcfpvhajcedozkby6jtihnzu 90 4 enable enable VB work_tsqcfpvhajcedozkby6jtihnzu 90 5 the the DT work_tsqcfpvhajcedozkby6jtihnzu 90 6 redundant redundant JJ work_tsqcfpvhajcedozkby6jtihnzu 90 7 takeover takeover NN work_tsqcfpvhajcedozkby6jtihnzu 90 8 system system NN work_tsqcfpvhajcedozkby6jtihnzu 90 9 in in IN work_tsqcfpvhajcedozkby6jtihnzu 90 10 an an DT work_tsqcfpvhajcedozkby6jtihnzu 90 11 emergency emergency NN work_tsqcfpvhajcedozkby6jtihnzu 90 12 , , , work_tsqcfpvhajcedozkby6jtihnzu 90 13 and and CC work_tsqcfpvhajcedozkby6jtihnzu 90 14 so so RB work_tsqcfpvhajcedozkby6jtihnzu 90 15 on on RB work_tsqcfpvhajcedozkby6jtihnzu 90 16 . . . work_tsqcfpvhajcedozkby6jtihnzu 91 1 After after IN work_tsqcfpvhajcedozkby6jtihnzu 91 2 blocking block VBG work_tsqcfpvhajcedozkby6jtihnzu 91 3 the the DT work_tsqcfpvhajcedozkby6jtihnzu 91 4 invasion invasion NN work_tsqcfpvhajcedozkby6jtihnzu 91 5 , , , work_tsqcfpvhajcedozkby6jtihnzu 91 6 it -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 91 7 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 91 8 necessary necessary JJ work_tsqcfpvhajcedozkby6jtihnzu 91 9 to to TO work_tsqcfpvhajcedozkby6jtihnzu 91 10 quickly quickly RB work_tsqcfpvhajcedozkby6jtihnzu 91 11 restore restore VB work_tsqcfpvhajcedozkby6jtihnzu 91 12 or or CC work_tsqcfpvhajcedozkby6jtihnzu 91 13 rebuild rebuild VB work_tsqcfpvhajcedozkby6jtihnzu 91 14 the the DT work_tsqcfpvhajcedozkby6jtihnzu 91 15 system system NN work_tsqcfpvhajcedozkby6jtihnzu 91 16 that that WDT work_tsqcfpvhajcedozkby6jtihnzu 91 17 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 91 18 attacked attack VBN work_tsqcfpvhajcedozkby6jtihnzu 91 19 or or CC work_tsqcfpvhajcedozkby6jtihnzu 91 20 infected infect VBN work_tsqcfpvhajcedozkby6jtihnzu 91 21 , , , work_tsqcfpvhajcedozkby6jtihnzu 91 22 and and CC work_tsqcfpvhajcedozkby6jtihnzu 91 23 should should MD work_tsqcfpvhajcedozkby6jtihnzu 91 24 have have VB work_tsqcfpvhajcedozkby6jtihnzu 91 25 the the DT work_tsqcfpvhajcedozkby6jtihnzu 91 26 corresponding corresponding JJ work_tsqcfpvhajcedozkby6jtihnzu 91 27 recovery recovery NN work_tsqcfpvhajcedozkby6jtihnzu 91 28 capability capability NN work_tsqcfpvhajcedozkby6jtihnzu 91 29 for for IN work_tsqcfpvhajcedozkby6jtihnzu 91 30 different different JJ work_tsqcfpvhajcedozkby6jtihnzu 91 31 attacks attack NNS work_tsqcfpvhajcedozkby6jtihnzu 91 32 . . . work_tsqcfpvhajcedozkby6jtihnzu 92 1 a a LS work_tsqcfpvhajcedozkby6jtihnzu 92 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 92 3 Physical physical JJ work_tsqcfpvhajcedozkby6jtihnzu 92 4 recovery recovery NN work_tsqcfpvhajcedozkby6jtihnzu 92 5 , , , work_tsqcfpvhajcedozkby6jtihnzu 92 6 set set VBN work_tsqcfpvhajcedozkby6jtihnzu 92 7 up up RP work_tsqcfpvhajcedozkby6jtihnzu 92 8 spare spare JJ work_tsqcfpvhajcedozkby6jtihnzu 92 9 equipment equipment NN work_tsqcfpvhajcedozkby6jtihnzu 92 10 , , , work_tsqcfpvhajcedozkby6jtihnzu 92 11 and and CC work_tsqcfpvhajcedozkby6jtihnzu 92 12 dredge dredge VB work_tsqcfpvhajcedozkby6jtihnzu 92 13 the the DT work_tsqcfpvhajcedozkby6jtihnzu 92 14 network network NN work_tsqcfpvhajcedozkby6jtihnzu 92 15 as as RB work_tsqcfpvhajcedozkby6jtihnzu 92 16 soon soon RB work_tsqcfpvhajcedozkby6jtihnzu 92 17 as as IN work_tsqcfpvhajcedozkby6jtihnzu 92 18 possible possible JJ work_tsqcfpvhajcedozkby6jtihnzu 92 19 . . . work_tsqcfpvhajcedozkby6jtihnzu 93 1 b b LS work_tsqcfpvhajcedozkby6jtihnzu 93 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 93 3 The the DT work_tsqcfpvhajcedozkby6jtihnzu 93 4 soft soft JJ work_tsqcfpvhajcedozkby6jtihnzu 93 5 and and CC work_tsqcfpvhajcedozkby6jtihnzu 93 6 hardware hardware NN work_tsqcfpvhajcedozkby6jtihnzu 93 7 loopholes loophole NNS work_tsqcfpvhajcedozkby6jtihnzu 93 8 in in IN work_tsqcfpvhajcedozkby6jtihnzu 93 9 the the DT work_tsqcfpvhajcedozkby6jtihnzu 93 10 repair repair NN work_tsqcfpvhajcedozkby6jtihnzu 93 11 system system NN work_tsqcfpvhajcedozkby6jtihnzu 93 12 . . . work_tsqcfpvhajcedozkby6jtihnzu 94 1 c c LS work_tsqcfpvhajcedozkby6jtihnzu 94 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 94 3 Repair repair VB work_tsqcfpvhajcedozkby6jtihnzu 94 4 or or CC work_tsqcfpvhajcedozkby6jtihnzu 94 5 replace replace VB work_tsqcfpvhajcedozkby6jtihnzu 94 6 damaged damage VBN work_tsqcfpvhajcedozkby6jtihnzu 94 7 soft soft JJ work_tsqcfpvhajcedozkby6jtihnzu 94 8 and and CC work_tsqcfpvhajcedozkby6jtihnzu 94 9 hardware hardware NN work_tsqcfpvhajcedozkby6jtihnzu 94 10 resources resource NNS work_tsqcfpvhajcedozkby6jtihnzu 94 11 . . . work_tsqcfpvhajcedozkby6jtihnzu 95 1 d d LS work_tsqcfpvhajcedozkby6jtihnzu 95 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 95 3 Recover recover VB work_tsqcfpvhajcedozkby6jtihnzu 95 4 the the DT work_tsqcfpvhajcedozkby6jtihnzu 95 5 damaged damage VBN work_tsqcfpvhajcedozkby6jtihnzu 95 6 data datum NNS work_tsqcfpvhajcedozkby6jtihnzu 95 7 from from IN work_tsqcfpvhajcedozkby6jtihnzu 95 8 the the DT work_tsqcfpvhajcedozkby6jtihnzu 95 9 backup backup JJ work_tsqcfpvhajcedozkby6jtihnzu 95 10 database database NN work_tsqcfpvhajcedozkby6jtihnzu 95 11 as as RB work_tsqcfpvhajcedozkby6jtihnzu 95 12 soon soon RB work_tsqcfpvhajcedozkby6jtihnzu 95 13 as as IN work_tsqcfpvhajcedozkby6jtihnzu 95 14 possible possible JJ work_tsqcfpvhajcedozkby6jtihnzu 95 15 . . . work_tsqcfpvhajcedozkby6jtihnzu 96 1 e e LS work_tsqcfpvhajcedozkby6jtihnzu 96 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 96 3 When when WRB work_tsqcfpvhajcedozkby6jtihnzu 96 4 the the DT work_tsqcfpvhajcedozkby6jtihnzu 96 5 time time NN work_tsqcfpvhajcedozkby6jtihnzu 96 6 and and CC work_tsqcfpvhajcedozkby6jtihnzu 96 7 technical technical JJ work_tsqcfpvhajcedozkby6jtihnzu 96 8 conditions condition NNS work_tsqcfpvhajcedozkby6jtihnzu 96 9 are be VBP work_tsqcfpvhajcedozkby6jtihnzu 96 10 allowed allow VBN work_tsqcfpvhajcedozkby6jtihnzu 96 11 , , , work_tsqcfpvhajcedozkby6jtihnzu 96 12 the the DT work_tsqcfpvhajcedozkby6jtihnzu 96 13 intrusion intrusion NN work_tsqcfpvhajcedozkby6jtihnzu 96 14 information information NN work_tsqcfpvhajcedozkby6jtihnzu 96 15 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 96 16 analyzed analyze VBN work_tsqcfpvhajcedozkby6jtihnzu 96 17 and and CC work_tsqcfpvhajcedozkby6jtihnzu 96 18 the the DT work_tsqcfpvhajcedozkby6jtihnzu 96 19 source source NN work_tsqcfpvhajcedozkby6jtihnzu 96 20 of of IN work_tsqcfpvhajcedozkby6jtihnzu 96 21 invasion invasion NN work_tsqcfpvhajcedozkby6jtihnzu 96 22 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 96 23 traced trace VBN work_tsqcfpvhajcedozkby6jtihnzu 96 24 . . . work_tsqcfpvhajcedozkby6jtihnzu 97 1 If if IN work_tsqcfpvhajcedozkby6jtihnzu 97 2 necessary necessary JJ work_tsqcfpvhajcedozkby6jtihnzu 97 3 , , , work_tsqcfpvhajcedozkby6jtihnzu 97 4 information information NN work_tsqcfpvhajcedozkby6jtihnzu 97 5 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 97 6 provided provide VBN work_tsqcfpvhajcedozkby6jtihnzu 97 7 to to IN work_tsqcfpvhajcedozkby6jtihnzu 97 8 the the DT work_tsqcfpvhajcedozkby6jtihnzu 97 9 public public JJ work_tsqcfpvhajcedozkby6jtihnzu 97 10 security security NN work_tsqcfpvhajcedozkby6jtihnzu 97 11 organs organ NNS work_tsqcfpvhajcedozkby6jtihnzu 97 12 . . . work_tsqcfpvhajcedozkby6jtihnzu 98 1 Advances advance NNS work_tsqcfpvhajcedozkby6jtihnzu 98 2 in in IN work_tsqcfpvhajcedozkby6jtihnzu 98 3 Computer Computer NNP work_tsqcfpvhajcedozkby6jtihnzu 98 4 Science Science NNP work_tsqcfpvhajcedozkby6jtihnzu 98 5 Research Research NNP work_tsqcfpvhajcedozkby6jtihnzu 98 6 , , , work_tsqcfpvhajcedozkby6jtihnzu 98 7 volume volume NN work_tsqcfpvhajcedozkby6jtihnzu 98 8 79 79 CD work_tsqcfpvhajcedozkby6jtihnzu 98 9 218 218 CD work_tsqcfpvhajcedozkby6jtihnzu 98 10 4 4 CD work_tsqcfpvhajcedozkby6jtihnzu 98 11 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 98 12 Prioritization prioritization NN work_tsqcfpvhajcedozkby6jtihnzu 98 13 of of IN work_tsqcfpvhajcedozkby6jtihnzu 98 14 key key JJ work_tsqcfpvhajcedozkby6jtihnzu 98 15 facilities facility NNS work_tsqcfpvhajcedozkby6jtihnzu 98 16 and and CC work_tsqcfpvhajcedozkby6jtihnzu 98 17 information information NN work_tsqcfpvhajcedozkby6jtihnzu 98 18 , , , work_tsqcfpvhajcedozkby6jtihnzu 98 19 and and CC work_tsqcfpvhajcedozkby6jtihnzu 98 20 level level NN work_tsqcfpvhajcedozkby6jtihnzu 98 21 management management NN work_tsqcfpvhajcedozkby6jtihnzu 98 22 . . . work_tsqcfpvhajcedozkby6jtihnzu 99 1 Prioritize prioritize VB work_tsqcfpvhajcedozkby6jtihnzu 99 2 key key JJ work_tsqcfpvhajcedozkby6jtihnzu 99 3 facilities facility NNS work_tsqcfpvhajcedozkby6jtihnzu 99 4 and and CC work_tsqcfpvhajcedozkby6jtihnzu 99 5 information information NN work_tsqcfpvhajcedozkby6jtihnzu 99 6 . . . work_tsqcfpvhajcedozkby6jtihnzu 100 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 100 2 more more RBR work_tsqcfpvhajcedozkby6jtihnzu 100 3 sensitive sensitive JJ work_tsqcfpvhajcedozkby6jtihnzu 100 4 information information NN work_tsqcfpvhajcedozkby6jtihnzu 100 5 and and CC work_tsqcfpvhajcedozkby6jtihnzu 100 6 the the DT work_tsqcfpvhajcedozkby6jtihnzu 100 7 facilities facility NNS work_tsqcfpvhajcedozkby6jtihnzu 100 8 that that WDT work_tsqcfpvhajcedozkby6jtihnzu 100 9 have have VBP work_tsqcfpvhajcedozkby6jtihnzu 100 10 a a DT work_tsqcfpvhajcedozkby6jtihnzu 100 11 great great JJ work_tsqcfpvhajcedozkby6jtihnzu 100 12 impact impact NN work_tsqcfpvhajcedozkby6jtihnzu 100 13 on on IN work_tsqcfpvhajcedozkby6jtihnzu 100 14 the the DT work_tsqcfpvhajcedozkby6jtihnzu 100 15 operation operation NN work_tsqcfpvhajcedozkby6jtihnzu 100 16 , , , work_tsqcfpvhajcedozkby6jtihnzu 100 17 the the DT work_tsqcfpvhajcedozkby6jtihnzu 100 18 more more RBR work_tsqcfpvhajcedozkby6jtihnzu 100 19 valuable valuable JJ work_tsqcfpvhajcedozkby6jtihnzu 100 20 it -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 100 21 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 100 22 . . . work_tsqcfpvhajcedozkby6jtihnzu 101 1 At at IN work_tsqcfpvhajcedozkby6jtihnzu 101 2 the the DT work_tsqcfpvhajcedozkby6jtihnzu 101 3 same same JJ work_tsqcfpvhajcedozkby6jtihnzu 101 4 time time NN work_tsqcfpvhajcedozkby6jtihnzu 101 5 , , , work_tsqcfpvhajcedozkby6jtihnzu 101 6 they -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 101 7 are be VBP work_tsqcfpvhajcedozkby6jtihnzu 101 8 more more RBR work_tsqcfpvhajcedozkby6jtihnzu 101 9 likely likely JJ work_tsqcfpvhajcedozkby6jtihnzu 101 10 to to TO work_tsqcfpvhajcedozkby6jtihnzu 101 11 encounter encounter VB work_tsqcfpvhajcedozkby6jtihnzu 101 12 risks risk NNS work_tsqcfpvhajcedozkby6jtihnzu 101 13 . . . work_tsqcfpvhajcedozkby6jtihnzu 102 1 Therefore therefore RB work_tsqcfpvhajcedozkby6jtihnzu 102 2 , , , work_tsqcfpvhajcedozkby6jtihnzu 102 3 we -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 102 4 need need VBP work_tsqcfpvhajcedozkby6jtihnzu 102 5 to to TO work_tsqcfpvhajcedozkby6jtihnzu 102 6 take take VB work_tsqcfpvhajcedozkby6jtihnzu 102 7 more more RBR work_tsqcfpvhajcedozkby6jtihnzu 102 8 secure secure JJ work_tsqcfpvhajcedozkby6jtihnzu 102 9 measures measure NNS work_tsqcfpvhajcedozkby6jtihnzu 102 10 for for IN work_tsqcfpvhajcedozkby6jtihnzu 102 11 facilities facility NNS work_tsqcfpvhajcedozkby6jtihnzu 102 12 and and CC work_tsqcfpvhajcedozkby6jtihnzu 102 13 information information NN work_tsqcfpvhajcedozkby6jtihnzu 102 14 with with IN work_tsqcfpvhajcedozkby6jtihnzu 102 15 high high JJ work_tsqcfpvhajcedozkby6jtihnzu 102 16 priority priority NN work_tsqcfpvhajcedozkby6jtihnzu 102 17 , , , work_tsqcfpvhajcedozkby6jtihnzu 102 18 so so IN work_tsqcfpvhajcedozkby6jtihnzu 102 19 that that IN work_tsqcfpvhajcedozkby6jtihnzu 102 20 intruders intruder NNS work_tsqcfpvhajcedozkby6jtihnzu 102 21 ca can MD work_tsqcfpvhajcedozkby6jtihnzu 102 22 n't not RB work_tsqcfpvhajcedozkby6jtihnzu 102 23 encroach encroach VB work_tsqcfpvhajcedozkby6jtihnzu 102 24 on on IN work_tsqcfpvhajcedozkby6jtihnzu 102 25 critical critical JJ work_tsqcfpvhajcedozkby6jtihnzu 102 26 facilities facility NNS work_tsqcfpvhajcedozkby6jtihnzu 102 27 and and CC work_tsqcfpvhajcedozkby6jtihnzu 102 28 obtain obtain VB work_tsqcfpvhajcedozkby6jtihnzu 102 29 confidential confidential JJ work_tsqcfpvhajcedozkby6jtihnzu 102 30 information information NN work_tsqcfpvhajcedozkby6jtihnzu 102 31 in in IN work_tsqcfpvhajcedozkby6jtihnzu 102 32 a a DT work_tsqcfpvhajcedozkby6jtihnzu 102 33 general general JJ work_tsqcfpvhajcedozkby6jtihnzu 102 34 way way NN work_tsqcfpvhajcedozkby6jtihnzu 102 35 . . . work_tsqcfpvhajcedozkby6jtihnzu 103 1 Even even RB work_tsqcfpvhajcedozkby6jtihnzu 103 2 if if IN work_tsqcfpvhajcedozkby6jtihnzu 103 3 you -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 103 4 get get VBP work_tsqcfpvhajcedozkby6jtihnzu 103 5 it -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 103 6 , , , work_tsqcfpvhajcedozkby6jtihnzu 103 7 you -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 103 8 ca can MD work_tsqcfpvhajcedozkby6jtihnzu 103 9 n't not RB work_tsqcfpvhajcedozkby6jtihnzu 103 10 parse parse VB work_tsqcfpvhajcedozkby6jtihnzu 103 11 the the DT work_tsqcfpvhajcedozkby6jtihnzu 103 12 actual actual JJ work_tsqcfpvhajcedozkby6jtihnzu 103 13 meaning meaning NN work_tsqcfpvhajcedozkby6jtihnzu 103 14 of of IN work_tsqcfpvhajcedozkby6jtihnzu 103 15 the the DT work_tsqcfpvhajcedozkby6jtihnzu 103 16 information information NN work_tsqcfpvhajcedozkby6jtihnzu 103 17 . . . work_tsqcfpvhajcedozkby6jtihnzu 104 1 5 5 LS work_tsqcfpvhajcedozkby6jtihnzu 104 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 104 3 Pay pay VB work_tsqcfpvhajcedozkby6jtihnzu 104 4 attention attention NN work_tsqcfpvhajcedozkby6jtihnzu 104 5 to to IN work_tsqcfpvhajcedozkby6jtihnzu 104 6 the the DT work_tsqcfpvhajcedozkby6jtihnzu 104 7 collection collection NN work_tsqcfpvhajcedozkby6jtihnzu 104 8 and and CC work_tsqcfpvhajcedozkby6jtihnzu 104 9 exchange exchange NN work_tsqcfpvhajcedozkby6jtihnzu 104 10 of of IN work_tsqcfpvhajcedozkby6jtihnzu 104 11 information information NN work_tsqcfpvhajcedozkby6jtihnzu 104 12 , , , work_tsqcfpvhajcedozkby6jtihnzu 104 13 consistent consistent JJ work_tsqcfpvhajcedozkby6jtihnzu 104 14 with with IN work_tsqcfpvhajcedozkby6jtihnzu 104 15 national national JJ work_tsqcfpvhajcedozkby6jtihnzu 104 16 law law NN work_tsqcfpvhajcedozkby6jtihnzu 104 17 In in IN work_tsqcfpvhajcedozkby6jtihnzu 104 18 order order NN work_tsqcfpvhajcedozkby6jtihnzu 104 19 to to TO work_tsqcfpvhajcedozkby6jtihnzu 104 20 ensure ensure VB work_tsqcfpvhajcedozkby6jtihnzu 104 21 the the DT work_tsqcfpvhajcedozkby6jtihnzu 104 22 security security NN work_tsqcfpvhajcedozkby6jtihnzu 104 23 of of IN work_tsqcfpvhajcedozkby6jtihnzu 104 24 the the DT work_tsqcfpvhajcedozkby6jtihnzu 104 25 network network NN work_tsqcfpvhajcedozkby6jtihnzu 104 26 , , , work_tsqcfpvhajcedozkby6jtihnzu 104 27 it -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 104 28 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 104 29 necessary necessary JJ work_tsqcfpvhajcedozkby6jtihnzu 104 30 to to TO work_tsqcfpvhajcedozkby6jtihnzu 104 31 establish establish VB work_tsqcfpvhajcedozkby6jtihnzu 104 32 a a DT work_tsqcfpvhajcedozkby6jtihnzu 104 33 reliable reliable JJ work_tsqcfpvhajcedozkby6jtihnzu 104 34 , , , work_tsqcfpvhajcedozkby6jtihnzu 104 35 unimpeded unimpeded JJ work_tsqcfpvhajcedozkby6jtihnzu 104 36 and and CC work_tsqcfpvhajcedozkby6jtihnzu 104 37 special special JJ work_tsqcfpvhajcedozkby6jtihnzu 104 38 communication communication NN work_tsqcfpvhajcedozkby6jtihnzu 104 39 channel channel NN work_tsqcfpvhajcedozkby6jtihnzu 104 40 . . . work_tsqcfpvhajcedozkby6jtihnzu 105 1 Establish establish VB work_tsqcfpvhajcedozkby6jtihnzu 105 2 a a DT work_tsqcfpvhajcedozkby6jtihnzu 105 3 unified unified JJ work_tsqcfpvhajcedozkby6jtihnzu 105 4 safety safety NN work_tsqcfpvhajcedozkby6jtihnzu 105 5 standard standard NN work_tsqcfpvhajcedozkby6jtihnzu 105 6 . . . work_tsqcfpvhajcedozkby6jtihnzu 106 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 106 2 network network NN work_tsqcfpvhajcedozkby6jtihnzu 106 3 management management NN work_tsqcfpvhajcedozkby6jtihnzu 106 4 department department NN work_tsqcfpvhajcedozkby6jtihnzu 106 5 should should MD work_tsqcfpvhajcedozkby6jtihnzu 106 6 work work VB work_tsqcfpvhajcedozkby6jtihnzu 106 7 closely closely RB work_tsqcfpvhajcedozkby6jtihnzu 106 8 with with IN work_tsqcfpvhajcedozkby6jtihnzu 106 9 other other JJ work_tsqcfpvhajcedozkby6jtihnzu 106 10 departments department NNS work_tsqcfpvhajcedozkby6jtihnzu 106 11 to to TO work_tsqcfpvhajcedozkby6jtihnzu 106 12 share share VB work_tsqcfpvhajcedozkby6jtihnzu 106 13 security security NN work_tsqcfpvhajcedozkby6jtihnzu 106 14 information information NN work_tsqcfpvhajcedozkby6jtihnzu 106 15 and and CC work_tsqcfpvhajcedozkby6jtihnzu 106 16 strengthen strengthen VB work_tsqcfpvhajcedozkby6jtihnzu 106 17 the the DT work_tsqcfpvhajcedozkby6jtihnzu 106 18 research research NN work_tsqcfpvhajcedozkby6jtihnzu 106 19 and and CC work_tsqcfpvhajcedozkby6jtihnzu 106 20 development development NN work_tsqcfpvhajcedozkby6jtihnzu 106 21 of of IN work_tsqcfpvhajcedozkby6jtihnzu 106 22 security security NN work_tsqcfpvhajcedozkby6jtihnzu 106 23 related related JJ work_tsqcfpvhajcedozkby6jtihnzu 106 24 technologies technology NNS work_tsqcfpvhajcedozkby6jtihnzu 106 25 . . . work_tsqcfpvhajcedozkby6jtihnzu 107 1 6 6 LS work_tsqcfpvhajcedozkby6jtihnzu 107 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 107 3 Pay pay VB work_tsqcfpvhajcedozkby6jtihnzu 107 4 attention attention NN work_tsqcfpvhajcedozkby6jtihnzu 107 5 to to IN work_tsqcfpvhajcedozkby6jtihnzu 107 6 the the DT work_tsqcfpvhajcedozkby6jtihnzu 107 7 training training NN work_tsqcfpvhajcedozkby6jtihnzu 107 8 and and CC work_tsqcfpvhajcedozkby6jtihnzu 107 9 employment employment NN work_tsqcfpvhajcedozkby6jtihnzu 107 10 of of IN work_tsqcfpvhajcedozkby6jtihnzu 107 11 talents talent NNS work_tsqcfpvhajcedozkby6jtihnzu 107 12 and and CC work_tsqcfpvhajcedozkby6jtihnzu 107 13 strengthen strengthen VB work_tsqcfpvhajcedozkby6jtihnzu 107 14 the the DT work_tsqcfpvhajcedozkby6jtihnzu 107 15 construction construction NN work_tsqcfpvhajcedozkby6jtihnzu 107 16 of of IN work_tsqcfpvhajcedozkby6jtihnzu 107 17 institutions institution NNS work_tsqcfpvhajcedozkby6jtihnzu 107 18 Invite invite VB work_tsqcfpvhajcedozkby6jtihnzu 107 19 some some DT work_tsqcfpvhajcedozkby6jtihnzu 107 20 information information NN work_tsqcfpvhajcedozkby6jtihnzu 107 21 security security NN work_tsqcfpvhajcedozkby6jtihnzu 107 22 experts expert NNS work_tsqcfpvhajcedozkby6jtihnzu 107 23 to to TO work_tsqcfpvhajcedozkby6jtihnzu 107 24 carry carry VB work_tsqcfpvhajcedozkby6jtihnzu 107 25 out out RP work_tsqcfpvhajcedozkby6jtihnzu 107 26 continuous continuous JJ work_tsqcfpvhajcedozkby6jtihnzu 107 27 safety safety NN work_tsqcfpvhajcedozkby6jtihnzu 107 28 training training NN work_tsqcfpvhajcedozkby6jtihnzu 107 29 for for IN work_tsqcfpvhajcedozkby6jtihnzu 107 30 the the DT work_tsqcfpvhajcedozkby6jtihnzu 107 31 existing exist VBG work_tsqcfpvhajcedozkby6jtihnzu 107 32 network network NN work_tsqcfpvhajcedozkby6jtihnzu 107 33 managers manager NNS work_tsqcfpvhajcedozkby6jtihnzu 107 34 , , , work_tsqcfpvhajcedozkby6jtihnzu 107 35 actively actively RB work_tsqcfpvhajcedozkby6jtihnzu 107 36 hire hire VBP work_tsqcfpvhajcedozkby6jtihnzu 107 37 and and CC work_tsqcfpvhajcedozkby6jtihnzu 107 38 educate educate VBP work_tsqcfpvhajcedozkby6jtihnzu 107 39 other other JJ work_tsqcfpvhajcedozkby6jtihnzu 107 40 personnel personnel NNS work_tsqcfpvhajcedozkby6jtihnzu 107 41 to to TO work_tsqcfpvhajcedozkby6jtihnzu 107 42 make make VB work_tsqcfpvhajcedozkby6jtihnzu 107 43 up up RP work_tsqcfpvhajcedozkby6jtihnzu 107 44 for for IN work_tsqcfpvhajcedozkby6jtihnzu 107 45 the the DT work_tsqcfpvhajcedozkby6jtihnzu 107 46 lack lack NN work_tsqcfpvhajcedozkby6jtihnzu 107 47 of of IN work_tsqcfpvhajcedozkby6jtihnzu 107 48 safety safety NN work_tsqcfpvhajcedozkby6jtihnzu 107 49 talents talent NNS work_tsqcfpvhajcedozkby6jtihnzu 107 50 . . . work_tsqcfpvhajcedozkby6jtihnzu 108 1 In in IN work_tsqcfpvhajcedozkby6jtihnzu 108 2 addition addition NN work_tsqcfpvhajcedozkby6jtihnzu 108 3 , , , work_tsqcfpvhajcedozkby6jtihnzu 108 4 we -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 108 5 have have VBP work_tsqcfpvhajcedozkby6jtihnzu 108 6 to to TO work_tsqcfpvhajcedozkby6jtihnzu 108 7 establish establish VB work_tsqcfpvhajcedozkby6jtihnzu 108 8 a a DT work_tsqcfpvhajcedozkby6jtihnzu 108 9 team team NN work_tsqcfpvhajcedozkby6jtihnzu 108 10 of of IN work_tsqcfpvhajcedozkby6jtihnzu 108 11 part part JJ work_tsqcfpvhajcedozkby6jtihnzu 108 12 - - HYPH work_tsqcfpvhajcedozkby6jtihnzu 108 13 time time NN work_tsqcfpvhajcedozkby6jtihnzu 108 14 security security NN work_tsqcfpvhajcedozkby6jtihnzu 108 15 administrators administrator NNS work_tsqcfpvhajcedozkby6jtihnzu 108 16 . . . work_tsqcfpvhajcedozkby6jtihnzu 109 1 7 7 LS work_tsqcfpvhajcedozkby6jtihnzu 109 2 ) ) -RRB- work_tsqcfpvhajcedozkby6jtihnzu 109 3 Strengthen strengthen VB work_tsqcfpvhajcedozkby6jtihnzu 109 4 the the DT work_tsqcfpvhajcedozkby6jtihnzu 109 5 construction construction NN work_tsqcfpvhajcedozkby6jtihnzu 109 6 of of IN work_tsqcfpvhajcedozkby6jtihnzu 109 7 the the DT work_tsqcfpvhajcedozkby6jtihnzu 109 8 system system NN work_tsqcfpvhajcedozkby6jtihnzu 109 9 and and CC work_tsqcfpvhajcedozkby6jtihnzu 109 10 improve improve VB work_tsqcfpvhajcedozkby6jtihnzu 109 11 the the DT work_tsqcfpvhajcedozkby6jtihnzu 109 12 management management NN work_tsqcfpvhajcedozkby6jtihnzu 109 13 level level NN work_tsqcfpvhajcedozkby6jtihnzu 109 14 Under under IN work_tsqcfpvhajcedozkby6jtihnzu 109 15 the the DT work_tsqcfpvhajcedozkby6jtihnzu 109 16 guidance guidance NN work_tsqcfpvhajcedozkby6jtihnzu 109 17 of of IN work_tsqcfpvhajcedozkby6jtihnzu 109 18 national national JJ work_tsqcfpvhajcedozkby6jtihnzu 109 19 law law NN work_tsqcfpvhajcedozkby6jtihnzu 109 20 , , , work_tsqcfpvhajcedozkby6jtihnzu 109 21 the the DT work_tsqcfpvhajcedozkby6jtihnzu 109 22 current current JJ work_tsqcfpvhajcedozkby6jtihnzu 109 23 regulations regulation NNS work_tsqcfpvhajcedozkby6jtihnzu 109 24 and and CC work_tsqcfpvhajcedozkby6jtihnzu 109 25 regulations regulation NNS work_tsqcfpvhajcedozkby6jtihnzu 109 26 are be VBP work_tsqcfpvhajcedozkby6jtihnzu 109 27 constantly constantly RB work_tsqcfpvhajcedozkby6jtihnzu 109 28 revised revise VBN work_tsqcfpvhajcedozkby6jtihnzu 109 29 and and CC work_tsqcfpvhajcedozkby6jtihnzu 109 30 perfected perfect VBN work_tsqcfpvhajcedozkby6jtihnzu 109 31 . . . work_tsqcfpvhajcedozkby6jtihnzu 110 1 It -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 110 2 provides provide VBZ work_tsqcfpvhajcedozkby6jtihnzu 110 3 a a DT work_tsqcfpvhajcedozkby6jtihnzu 110 4 legal legal JJ work_tsqcfpvhajcedozkby6jtihnzu 110 5 framework framework NN work_tsqcfpvhajcedozkby6jtihnzu 110 6 for for IN work_tsqcfpvhajcedozkby6jtihnzu 110 7 the the DT work_tsqcfpvhajcedozkby6jtihnzu 110 8 security security NN work_tsqcfpvhajcedozkby6jtihnzu 110 9 of of IN work_tsqcfpvhajcedozkby6jtihnzu 110 10 information information NN work_tsqcfpvhajcedozkby6jtihnzu 110 11 network network NN work_tsqcfpvhajcedozkby6jtihnzu 110 12 , , , work_tsqcfpvhajcedozkby6jtihnzu 110 13 and and CC work_tsqcfpvhajcedozkby6jtihnzu 110 14 constantly constantly RB work_tsqcfpvhajcedozkby6jtihnzu 110 15 improves improve VBZ work_tsqcfpvhajcedozkby6jtihnzu 110 16 the the DT work_tsqcfpvhajcedozkby6jtihnzu 110 17 management management NN work_tsqcfpvhajcedozkby6jtihnzu 110 18 level level NN work_tsqcfpvhajcedozkby6jtihnzu 110 19 . . . work_tsqcfpvhajcedozkby6jtihnzu 111 1 8) 8) CD work_tsqcfpvhajcedozkby6jtihnzu 111 2 Strengthen strengthen VB work_tsqcfpvhajcedozkby6jtihnzu 111 3 the the DT work_tsqcfpvhajcedozkby6jtihnzu 111 4 safety safety NN work_tsqcfpvhajcedozkby6jtihnzu 111 5 education education NN work_tsqcfpvhajcedozkby6jtihnzu 111 6 for for IN work_tsqcfpvhajcedozkby6jtihnzu 111 7 all all DT work_tsqcfpvhajcedozkby6jtihnzu 111 8 kinds kind NNS work_tsqcfpvhajcedozkby6jtihnzu 111 9 of of IN work_tsqcfpvhajcedozkby6jtihnzu 111 10 personnel personnel NNS work_tsqcfpvhajcedozkby6jtihnzu 111 11 so so IN work_tsqcfpvhajcedozkby6jtihnzu 111 12 as as IN work_tsqcfpvhajcedozkby6jtihnzu 111 13 to to TO work_tsqcfpvhajcedozkby6jtihnzu 111 14 make make VB work_tsqcfpvhajcedozkby6jtihnzu 111 15 the the DT work_tsqcfpvhajcedozkby6jtihnzu 111 16 public public NN work_tsqcfpvhajcedozkby6jtihnzu 111 17 understand understand VB work_tsqcfpvhajcedozkby6jtihnzu 111 18 the the DT work_tsqcfpvhajcedozkby6jtihnzu 111 19 necessity necessity NN work_tsqcfpvhajcedozkby6jtihnzu 111 20 of of IN work_tsqcfpvhajcedozkby6jtihnzu 111 21 improving improve VBG work_tsqcfpvhajcedozkby6jtihnzu 111 22 the the DT work_tsqcfpvhajcedozkby6jtihnzu 111 23 network network NN work_tsqcfpvhajcedozkby6jtihnzu 111 24 security security NN work_tsqcfpvhajcedozkby6jtihnzu 111 25 . . . work_tsqcfpvhajcedozkby6jtihnzu 112 1 Improve improve VB work_tsqcfpvhajcedozkby6jtihnzu 112 2 the the DT work_tsqcfpvhajcedozkby6jtihnzu 112 3 public public JJ work_tsqcfpvhajcedozkby6jtihnzu 112 4 awareness awareness NN work_tsqcfpvhajcedozkby6jtihnzu 112 5 of of IN work_tsqcfpvhajcedozkby6jtihnzu 112 6 network network NN work_tsqcfpvhajcedozkby6jtihnzu 112 7 security security NN work_tsqcfpvhajcedozkby6jtihnzu 112 8 , , , work_tsqcfpvhajcedozkby6jtihnzu 112 9 enhance enhance VB work_tsqcfpvhajcedozkby6jtihnzu 112 10 the the DT work_tsqcfpvhajcedozkby6jtihnzu 112 11 threat threat NN work_tsqcfpvhajcedozkby6jtihnzu 112 12 to to IN work_tsqcfpvhajcedozkby6jtihnzu 112 13 the the DT work_tsqcfpvhajcedozkby6jtihnzu 112 14 information information NN work_tsqcfpvhajcedozkby6jtihnzu 112 15 system system NN work_tsqcfpvhajcedozkby6jtihnzu 112 16 and and CC work_tsqcfpvhajcedozkby6jtihnzu 112 17 their -PRON- PRP$ work_tsqcfpvhajcedozkby6jtihnzu 112 18 understanding understanding NN work_tsqcfpvhajcedozkby6jtihnzu 112 19 and and CC work_tsqcfpvhajcedozkby6jtihnzu 112 20 understanding understanding NN work_tsqcfpvhajcedozkby6jtihnzu 112 21 of of IN work_tsqcfpvhajcedozkby6jtihnzu 112 22 their -PRON- PRP$ work_tsqcfpvhajcedozkby6jtihnzu 112 23 characteristics characteristic NNS work_tsqcfpvhajcedozkby6jtihnzu 112 24 . . . work_tsqcfpvhajcedozkby6jtihnzu 113 1 Improve improve VB work_tsqcfpvhajcedozkby6jtihnzu 113 2 the the DT work_tsqcfpvhajcedozkby6jtihnzu 113 3 ability ability NN work_tsqcfpvhajcedozkby6jtihnzu 113 4 of of IN work_tsqcfpvhajcedozkby6jtihnzu 113 5 our -PRON- PRP$ work_tsqcfpvhajcedozkby6jtihnzu 113 6 defended defended JJ work_tsqcfpvhajcedozkby6jtihnzu 113 7 invaders invader NNS work_tsqcfpvhajcedozkby6jtihnzu 113 8 to to TO work_tsqcfpvhajcedozkby6jtihnzu 113 9 attack attack VB work_tsqcfpvhajcedozkby6jtihnzu 113 10 before before IN work_tsqcfpvhajcedozkby6jtihnzu 113 11 the the DT work_tsqcfpvhajcedozkby6jtihnzu 113 12 disastrous disastrous JJ work_tsqcfpvhajcedozkby6jtihnzu 113 13 events event NNS work_tsqcfpvhajcedozkby6jtihnzu 113 14 come come VBP work_tsqcfpvhajcedozkby6jtihnzu 113 15 III iii CD work_tsqcfpvhajcedozkby6jtihnzu 113 16 . . . work_tsqcfpvhajcedozkby6jtihnzu 114 1 CONCLUSION CONCLUSION NNP work_tsqcfpvhajcedozkby6jtihnzu 114 2 At at IN work_tsqcfpvhajcedozkby6jtihnzu 114 3 present present NN work_tsqcfpvhajcedozkby6jtihnzu 114 4 , , , work_tsqcfpvhajcedozkby6jtihnzu 114 5 the the DT work_tsqcfpvhajcedozkby6jtihnzu 114 6 problem problem NN work_tsqcfpvhajcedozkby6jtihnzu 114 7 of of IN work_tsqcfpvhajcedozkby6jtihnzu 114 8 network network NN work_tsqcfpvhajcedozkby6jtihnzu 114 9 security security NN work_tsqcfpvhajcedozkby6jtihnzu 114 10 has have VBZ work_tsqcfpvhajcedozkby6jtihnzu 114 11 become become VBN work_tsqcfpvhajcedozkby6jtihnzu 114 12 a a DT work_tsqcfpvhajcedozkby6jtihnzu 114 13 serious serious JJ work_tsqcfpvhajcedozkby6jtihnzu 114 14 form form NN work_tsqcfpvhajcedozkby6jtihnzu 114 15 that that WDT work_tsqcfpvhajcedozkby6jtihnzu 114 16 affects affect VBZ work_tsqcfpvhajcedozkby6jtihnzu 114 17 the the DT work_tsqcfpvhajcedozkby6jtihnzu 114 18 national national NNP work_tsqcfpvhajcedozkby6jtihnzu 114 19 security security NN work_tsqcfpvhajcedozkby6jtihnzu 114 20 and and CC work_tsqcfpvhajcedozkby6jtihnzu 114 21 social social JJ work_tsqcfpvhajcedozkby6jtihnzu 114 22 stability stability NN work_tsqcfpvhajcedozkby6jtihnzu 114 23 . . . work_tsqcfpvhajcedozkby6jtihnzu 115 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 115 2 implementation implementation NN work_tsqcfpvhajcedozkby6jtihnzu 115 3 of of IN work_tsqcfpvhajcedozkby6jtihnzu 115 4 network network NN work_tsqcfpvhajcedozkby6jtihnzu 115 5 security security NN work_tsqcfpvhajcedozkby6jtihnzu 115 6 plan plan NN work_tsqcfpvhajcedozkby6jtihnzu 115 7 has have VBZ work_tsqcfpvhajcedozkby6jtihnzu 115 8 shown show VBN work_tsqcfpvhajcedozkby6jtihnzu 115 9 profound profound JJ work_tsqcfpvhajcedozkby6jtihnzu 115 10 practical practical JJ work_tsqcfpvhajcedozkby6jtihnzu 115 11 significance significance NN work_tsqcfpvhajcedozkby6jtihnzu 115 12 . . . work_tsqcfpvhajcedozkby6jtihnzu 116 1 In in IN work_tsqcfpvhajcedozkby6jtihnzu 116 2 the the DT work_tsqcfpvhajcedozkby6jtihnzu 116 3 long long JJ work_tsqcfpvhajcedozkby6jtihnzu 116 4 process process NN work_tsqcfpvhajcedozkby6jtihnzu 116 5 of of IN work_tsqcfpvhajcedozkby6jtihnzu 116 6 security security NN work_tsqcfpvhajcedozkby6jtihnzu 116 7 assurance assurance NN work_tsqcfpvhajcedozkby6jtihnzu 116 8 , , , work_tsqcfpvhajcedozkby6jtihnzu 116 9 the the DT work_tsqcfpvhajcedozkby6jtihnzu 116 10 network network NN work_tsqcfpvhajcedozkby6jtihnzu 116 11 security security NN work_tsqcfpvhajcedozkby6jtihnzu 116 12 plan plan NN work_tsqcfpvhajcedozkby6jtihnzu 116 13 is be VBZ work_tsqcfpvhajcedozkby6jtihnzu 116 14 just just RB work_tsqcfpvhajcedozkby6jtihnzu 116 15 the the DT work_tsqcfpvhajcedozkby6jtihnzu 116 16 first first JJ work_tsqcfpvhajcedozkby6jtihnzu 116 17 step step NN work_tsqcfpvhajcedozkby6jtihnzu 116 18 , , , work_tsqcfpvhajcedozkby6jtihnzu 116 19 but but CC work_tsqcfpvhajcedozkby6jtihnzu 116 20 we -PRON- PRP work_tsqcfpvhajcedozkby6jtihnzu 116 21 can can MD work_tsqcfpvhajcedozkby6jtihnzu 116 22 be be VB work_tsqcfpvhajcedozkby6jtihnzu 116 23 sure sure JJ work_tsqcfpvhajcedozkby6jtihnzu 116 24 that that IN work_tsqcfpvhajcedozkby6jtihnzu 116 25 the the DT work_tsqcfpvhajcedozkby6jtihnzu 116 26 problem problem NN work_tsqcfpvhajcedozkby6jtihnzu 116 27 of of IN work_tsqcfpvhajcedozkby6jtihnzu 116 28 network network NN work_tsqcfpvhajcedozkby6jtihnzu 116 29 security security NN work_tsqcfpvhajcedozkby6jtihnzu 116 30 will will MD work_tsqcfpvhajcedozkby6jtihnzu 116 31 also also RB work_tsqcfpvhajcedozkby6jtihnzu 116 32 receive receive VB work_tsqcfpvhajcedozkby6jtihnzu 116 33 more more JJR work_tsqcfpvhajcedozkby6jtihnzu 116 34 and and CC work_tsqcfpvhajcedozkby6jtihnzu 116 35 more more JJR work_tsqcfpvhajcedozkby6jtihnzu 116 36 attention attention NN work_tsqcfpvhajcedozkby6jtihnzu 116 37 . . . work_tsqcfpvhajcedozkby6jtihnzu 117 1 REFERENCE reference NN work_tsqcfpvhajcedozkby6jtihnzu 117 2 [ [ -LRB- work_tsqcfpvhajcedozkby6jtihnzu 117 3 1 1 CD work_tsqcfpvhajcedozkby6jtihnzu 117 4 ] ] -RRB- work_tsqcfpvhajcedozkby6jtihnzu 117 5 Gu Gu NNP work_tsqcfpvhajcedozkby6jtihnzu 117 6 Huaxiang Huaxiang NNP work_tsqcfpvhajcedozkby6jtihnzu 117 7 . . . work_tsqcfpvhajcedozkby6jtihnzu 118 1 The the DT work_tsqcfpvhajcedozkby6jtihnzu 118 2 legal legal JJ work_tsqcfpvhajcedozkby6jtihnzu 118 3 measures measure NNS work_tsqcfpvhajcedozkby6jtihnzu 118 4 and and CC work_tsqcfpvhajcedozkby6jtihnzu 118 5 Enlightenment enlightenment NN work_tsqcfpvhajcedozkby6jtihnzu 118 6 for for IN work_tsqcfpvhajcedozkby6jtihnzu 118 7 the the DT work_tsqcfpvhajcedozkby6jtihnzu 118 8 security security NN work_tsqcfpvhajcedozkby6jtihnzu 118 9 of of IN work_tsqcfpvhajcedozkby6jtihnzu 118 10 information information NN work_tsqcfpvhajcedozkby6jtihnzu 118 11 security security NN work_tsqcfpvhajcedozkby6jtihnzu 118 12 abroad abroad RB work_tsqcfpvhajcedozkby6jtihnzu 118 13 [ [ -LRB- work_tsqcfpvhajcedozkby6jtihnzu 118 14 J J NNP work_tsqcfpvhajcedozkby6jtihnzu 118 15 ] ] -RRB- work_tsqcfpvhajcedozkby6jtihnzu 118 16 . . . work_tsqcfpvhajcedozkby6jtihnzu 119 1 Reform reform NN work_tsqcfpvhajcedozkby6jtihnzu 119 2 of of IN work_tsqcfpvhajcedozkby6jtihnzu 119 3 administrative administrative JJ work_tsqcfpvhajcedozkby6jtihnzu 119 4 managemen manageman NNS work_tsqcfpvhajcedozkby6jtihnzu 119 5 . . . work_tsqcfpvhajcedozkby6jtihnzu 120 1 2010(12):70 2010(12):70 CD work_tsqcfpvhajcedozkby6jtihnzu 120 2 - - HYPH work_tsqcfpvhajcedozkby6jtihnzu 120 3 74 74 CD work_tsqcfpvhajcedozkby6jtihnzu 120 4 . . . work_tsqcfpvhajcedozkby6jtihnzu 121 1 [ [ -LRB- work_tsqcfpvhajcedozkby6jtihnzu 121 2 2 2 LS work_tsqcfpvhajcedozkby6jtihnzu 121 3 ] ] -RRB- work_tsqcfpvhajcedozkby6jtihnzu 121 4 Ma Ma NNP work_tsqcfpvhajcedozkby6jtihnzu 121 5 Minhu Minhu NNP work_tsqcfpvhajcedozkby6jtihnzu 121 6 . . . work_tsqcfpvhajcedozkby6jtihnzu 122 1 Internet internet NN work_tsqcfpvhajcedozkby6jtihnzu 122 2 security security NN work_tsqcfpvhajcedozkby6jtihnzu 122 3 law law NN work_tsqcfpvhajcedozkby6jtihnzu 122 4 [ [ -LRB- work_tsqcfpvhajcedozkby6jtihnzu 122 5 M M NNP work_tsqcfpvhajcedozkby6jtihnzu 122 6 ] ] -RRB- work_tsqcfpvhajcedozkby6jtihnzu 122 7 . . . work_tsqcfpvhajcedozkby6jtihnzu 123 1 Xi'an Xi'an NNP work_tsqcfpvhajcedozkby6jtihnzu 123 2 Jiao Jiao NNP work_tsqcfpvhajcedozkby6jtihnzu 123 3 Tong Tong NNP work_tsqcfpvhajcedozkby6jtihnzu 123 4 University University NNP work_tsqcfpvhajcedozkby6jtihnzu 123 5 press.2003 press.2003 NNP work_tsqcfpvhajcedozkby6jtihnzu 123 6 . . . work_tsqcfpvhajcedozkby6jtihnzu 124 1 [ [ -LRB- work_tsqcfpvhajcedozkby6jtihnzu 124 2 3 3 LS work_tsqcfpvhajcedozkby6jtihnzu 124 3 ] ] -RRB- work_tsqcfpvhajcedozkby6jtihnzu 124 4 Zhang Zhang NNP work_tsqcfpvhajcedozkby6jtihnzu 124 5 Lei Lei NNP work_tsqcfpvhajcedozkby6jtihnzu 124 6 . . . work_tsqcfpvhajcedozkby6jtihnzu 125 1 Development development NN work_tsqcfpvhajcedozkby6jtihnzu 125 2 of of IN work_tsqcfpvhajcedozkby6jtihnzu 125 3 computer computer NN work_tsqcfpvhajcedozkby6jtihnzu 125 4 information information NN work_tsqcfpvhajcedozkby6jtihnzu 125 5 network network NN work_tsqcfpvhajcedozkby6jtihnzu 125 6 technology technology NN work_tsqcfpvhajcedozkby6jtihnzu 125 7 [ [ -LRB- work_tsqcfpvhajcedozkby6jtihnzu 125 8 J J NNP work_tsqcfpvhajcedozkby6jtihnzu 125 9 ] ] -RRB- work_tsqcfpvhajcedozkby6jtihnzu 125 10 . . . work_tsqcfpvhajcedozkby6jtihnzu 126 1 computer computer NN work_tsqcfpvhajcedozkby6jtihnzu 126 2 knowledge knowledge NN work_tsqcfpvhajcedozkby6jtihnzu 126 3 and and CC work_tsqcfpvhajcedozkby6jtihnzu 126 4 technology technology NN work_tsqcfpvhajcedozkby6jtihnzu 126 5 . . . work_tsqcfpvhajcedozkby6jtihnzu 127 1 2014 2014 CD work_tsqcfpvhajcedozkby6jtihnzu 127 2 ( ( -LRB- work_tsqcfpvhajcedozkby6jtihnzu 127 3 03):482 03):482 NNP work_tsqcfpvhajcedozkby6jtihnzu 127 4 - - HYPH work_tsqcfpvhajcedozkby6jtihnzu 127 5 484 484 NNP work_tsqcfpvhajcedozkby6jtihnzu 127 6 . . . work_tsqcfpvhajcedozkby6jtihnzu 128 1 [ [ -LRB- work_tsqcfpvhajcedozkby6jtihnzu 128 2 4 4 CD work_tsqcfpvhajcedozkby6jtihnzu 128 3 ] ] -RRB- work_tsqcfpvhajcedozkby6jtihnzu 128 4 Wei Wei NNP work_tsqcfpvhajcedozkby6jtihnzu 128 5 Suming Suming NNP work_tsqcfpvhajcedozkby6jtihnzu 128 6 . . . work_tsqcfpvhajcedozkby6jtihnzu 129 1 Discussion discussion NN work_tsqcfpvhajcedozkby6jtihnzu 129 2 on on IN work_tsqcfpvhajcedozkby6jtihnzu 129 3 the the DT work_tsqcfpvhajcedozkby6jtihnzu 129 4 computer computer NN work_tsqcfpvhajcedozkby6jtihnzu 129 5 information information NN work_tsqcfpvhajcedozkby6jtihnzu 129 6 network network NN work_tsqcfpvhajcedozkby6jtihnzu 129 7 security security NN work_tsqcfpvhajcedozkby6jtihnzu 129 8 technology technology NN work_tsqcfpvhajcedozkby6jtihnzu 129 9 and and CC work_tsqcfpvhajcedozkby6jtihnzu 129 10 security security NN work_tsqcfpvhajcedozkby6jtihnzu 129 11 measures measure NNS work_tsqcfpvhajcedozkby6jtihnzu 129 12 [ [ -LRB- work_tsqcfpvhajcedozkby6jtihnzu 129 13 J J NNP work_tsqcfpvhajcedozkby6jtihnzu 129 14 ] ] -RRB- work_tsqcfpvhajcedozkby6jtihnzu 129 15 . . . work_tsqcfpvhajcedozkby6jtihnzu 130 1 Electronics Electronics NNP work_tsqcfpvhajcedozkby6jtihnzu 130 2 World World NNP work_tsqcfpvhajcedozkby6jtihnzu 130 3 . . . work_tsqcfpvhajcedozkby6jtihnzu 131 1 2017 2017 CD work_tsqcfpvhajcedozkby6jtihnzu 131 2 ( ( -LRB- work_tsqcfpvhajcedozkby6jtihnzu 131 3 03):20 03):20 CD work_tsqcfpvhajcedozkby6jtihnzu 131 4 - - SYM work_tsqcfpvhajcedozkby6jtihnzu 131 5 21 21 CD work_tsqcfpvhajcedozkby6jtihnzu 131 6 . . . work_tsqcfpvhajcedozkby6jtihnzu 132 1 Advances advance NNS work_tsqcfpvhajcedozkby6jtihnzu 132 2 in in IN work_tsqcfpvhajcedozkby6jtihnzu 132 3 Computer Computer NNP work_tsqcfpvhajcedozkby6jtihnzu 132 4 Science Science NNP work_tsqcfpvhajcedozkby6jtihnzu 132 5 Research Research NNP work_tsqcfpvhajcedozkby6jtihnzu 132 6 , , , work_tsqcfpvhajcedozkby6jtihnzu 132 7 volume volume NN work_tsqcfpvhajcedozkby6jtihnzu 132 8 79 79 CD work_tsqcfpvhajcedozkby6jtihnzu 132 9 219 219 CD