XXXXXXXX,X. (XXXX). XXXXXXXX XXXXXXXXX control using XXXXXXXX XXXXXXXXXXXXX for IP XXXX XXXXXXXXXX. XXXXXXXXX in Securing XX Cores: Forensic XXXXXXXXX control and XXXXXXXXXXX techniques, 25-65. XXXXX://doi.XXX/10.XXXX/XXXXXXXXXXXX