<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-762893744118596832</id><updated>2024-10-31T23:27:47.253-07:00</updated><category term="Information Security"/><category term="My Life through Words"/><category term="PhD Journey"/><category term="Publications"/><category term="RSSP Workshops - Y3"/><category term="Teaching &amp; Education"/><category term="RSSP Workshops - Y1"/><category term="RSSP Workshops - Y2"/><category term="Cuentos"/><category term="Reports"/><title type='text'>D. A. Flores</title><subtitle type='html'>My research, my interests, and my life journey... Bienvenidos!</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://denys-flores.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/-/PhD+Journey'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/search/label/PhD%20Journey'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>22</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-2916421295773408772</id><published>2020-01-23T21:30:00.000-08:00</published><updated>2020-01-23T21:30:25.122-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><title type='text'>Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing (Article)</title><content type='html'>The18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Abstract&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Database audit records are important for investigating suspicious 
actions against transactional databases. Their admissibility as digital 
evidence depends on satisfying Chain of Custody (CoC) properties during 
their generation, collection and preservation in order to prevent their 
modification, guarantee action accountability, and allow third-party 
verification. However, their production has relied on auditing 
capabilities provided by commercial database systems which may not be 
effective if malicious users (or insiders) misuse their privileges to 
disable audit controls, and compromise their admissibility. Hence, in 
this paper, we propose a forensically-aware distributed database 
architecture that implements CoC properties as functional requirements 
to produce admissible audit records. The novelty of our proposal is the 
use of hybrid logical clocks, which compared with a previous centralised
 vector-clock architecture, has evident advantages as it (i) allows for 
more accurate provenance and causality tracking of insider actions, (ii)
 is more scalable in terms of system size, and (iii) although latency is
 higher (as expected in distributed environments), 70 per cent of user 
transactions are executed within acceptable latency intervals.&lt;br /&gt;
&lt;br /&gt;
DOI: https://doi.org/10.1109/TrustCom/BigDataSE.2019.00038 </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/2916421295773408772'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/2916421295773408772'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2020/01/hybrid-logical-clocks-for-database_23.html' title='Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing (Article)'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-4841693057446161177</id><published>2020-01-23T21:26:00.001-08:00</published><updated>2020-01-23T21:27:33.483-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><title type='text'>Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;
k
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4K1DGYvuALFc2p4oAp5pUvNgTsPBqm-EEL9KXE72aPheq0ncDTqAsJsGtn1sEPcqNwfJ_1kjmSj_pE2LecJBsjurI-k88HPY9YMaDXAGmpj8-kfysipTxDRqt9PsHQr5fZ9FG__4-9hEh/s1600/IMG-20190808-WA0000.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;604&quot; data-original-width=&quot;804&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4K1DGYvuALFc2p4oAp5pUvNgTsPBqm-EEL9KXE72aPheq0ncDTqAsJsGtn1sEPcqNwfJ_1kjmSj_pE2LecJBsjurI-k88HPY9YMaDXAGmpj8-kfysipTxDRqt9PsHQr5fZ9FG__4-9hEh/s320/IMG-20190808-WA0000.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
In a fast-growing cyber security threat landscape, game-changing 
techniques in information security, trust, privacy and forensics are 
required for a sustainable future.&amp;nbsp;CROW&amp;nbsp;and&amp;nbsp;STRATUS&amp;nbsp;are proud to host 
the 18th IEEE International Conference on Trust, Security and Privacy in
 Computing and Communications (IEEE TrustCom-19) which was held at 
Rotorua, New Zealand on 5-8 August 2019.
&lt;br /&gt;
&lt;br /&gt;
As a leading international conference in the area of trust, 
information security and privacy, and forensics, the IEEE TrustCom 2019 
conference aims to bring together international researchers and 
practitioners working on trusted computing and communications, with 
regard to trust, security, privacy, reliability, dependability, 
survivability, availability, and fault tolerance aspects of computer 
systems and networks – providing a forum to present and discuss emerging
 ideas and trends in this highly challenging research field.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;
&lt;iframe align=&quot;middle&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;356&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;https://www.slideshare.net/slideshow/embed_code/key/gE9rPNIOMcEU3Q&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;427&quot;&gt; &lt;/iframe&gt; &lt;/div&gt;
&lt;div style=&quot;margin-bottom: 5px; text-align: center;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;https://www.slideshare.net/secret/gE9rPNIOMcEU3Q&quot; target=&quot;_blank&quot; title=&quot;D flores trust-com19-pres&quot;&gt;TrustCom-19-Paper ID 158&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;https://www.slideshare.net/DenysAFlores&quot; target=&quot;_blank&quot;&gt;Denys A. Flores&lt;/a&gt;&lt;/b&gt; &lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/4841693057446161177'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/4841693057446161177'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2020/01/hybrid-logical-clocks-for-database.html' title='Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4K1DGYvuALFc2p4oAp5pUvNgTsPBqm-EEL9KXE72aPheq0ncDTqAsJsGtn1sEPcqNwfJ_1kjmSj_pE2LecJBsjurI-k88HPY9YMaDXAGmpj8-kfysipTxDRqt9PsHQr5fZ9FG__4-9hEh/s72-c/IMG-20190808-WA0000.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-680436453800549489</id><published>2018-07-27T22:18:00.000-07:00</published><updated>2020-07-27T22:19:28.328-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><category scheme="http://www.blogger.com/atom/ns#" term="Reports"/><title type='text'>PhD Annual Progress Report - Y3</title><content type='html'>&lt;div style=&quot;text-align: left;&quot;&gt;
This is my last research report before submission 😀😉&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;511&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;https://www.slideshare.net/slideshow/embed_code/key/Mcd2fiPR0LKCi8&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;479&quot;&gt; &lt;/iframe&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/680436453800549489'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/680436453800549489'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2018/07/phd-annual-progress-report-y3.html' title='PhD Annual Progress Report - Y3'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-1860162758985393604</id><published>2018-07-10T06:15:00.001-07:00</published><updated>2018-07-10T06:18:14.668-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="My Life through Words"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><title type='text'>Know-Your-Adversary: Towards a Forensically-Aware Architecture for Analysing Malicious Insider Actions against Transactional Databases.</title><content type='html'>&lt;b&gt;Date and Time:&lt;/b&gt; Friday, 29 June 2018. 10:20 - 10:35&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Abstract: &lt;/b&gt;Database audit records can be used as forensic evidence to investigate suspicious actions against transactional databases. Currently, these actions are being perpetrated by trusted users (insiders) who interact with databases using data manipulation (DML) operations. Although the investigation of such actions rely on audit records, these must be produced during the normal operation of a forensically-aware database architecture. I.e. following an unbroken accountability trail known as Chain-of-Custody (CoC) to ensure their proper production. Hence, our research aims to define the functional requirements of such an architecture, assuming role segregation, provenance, event timelining and causality as CoC requirements, and introducing forensic controllers for the generation, collection and preservation of audit records. These controllers use vector clocks in centralised settings, and hybrid logical clocks in distributed environments to produce a timeline that can be used for analysing provenance and causality of DML operations derived from insider activity.
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;485&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;//www.slideshare.net/slideshow/embed_code/key/cr9QuM1T424o5J&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;595&quot;&gt; &lt;/iframe&gt; &lt;/div&gt;
&lt;div style=&quot;margin-bottom: 5px; text-align: center;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;https://www.slideshare.net/secret/cr9QuM1T424o5J&quot; target=&quot;_blank&quot; title=&quot;D flores wpccs18&quot;&gt;D flores wpccs18&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;https://www.slideshare.net/DenysAFlores&quot; target=&quot;_blank&quot;&gt;Denys A. Flores&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDvUmnrkt9E0mj0MZmyktN7L0js7GW3m19eJCpGyolFaQpchBi_yIx0lll1RGmCZ-C2CPmybBggGv_uQUs-0i9_hJ8VSRHljn-vAkczPUerf1igglSIF8eXp6aQ-lqKiFYbKE-oktdCSDe/s1600/IMG-20180629-WA0001.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1024&quot; data-original-width=&quot;576&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDvUmnrkt9E0mj0MZmyktN7L0js7GW3m19eJCpGyolFaQpchBi_yIx0lll1RGmCZ-C2CPmybBggGv_uQUs-0i9_hJ8VSRHljn-vAkczPUerf1igglSIF8eXp6aQ-lqKiFYbKE-oktdCSDe/s320/IMG-20180629-WA0001.jpg&quot; width=&quot;180&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyFWewmqI59IkPC-FUluLcFT2s57O_cRhAiS1jId5bOF3rAjrJNim8XALSNczRZgxxQ-hdLUhBq_7A_xMPWMUzZwBzpDgdceGcotqkqTT66kjyIpDrYUBgot7TDeKylBb3Zx0B7sJ8OBpZ/s1600/IMG_20180629_103017.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1600&quot; data-original-width=&quot;1200&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyFWewmqI59IkPC-FUluLcFT2s57O_cRhAiS1jId5bOF3rAjrJNim8XALSNczRZgxxQ-hdLUhBq_7A_xMPWMUzZwBzpDgdceGcotqkqTT66kjyIpDrYUBgot7TDeKylBb3Zx0B7sJ8OBpZ/s320/IMG_20180629_103017.jpg&quot; width=&quot;240&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5XVDzzKdNkFktfxm8dD6cs7rHg7qxjECKpUAanP0h_SXNn6wVODv2HF_D9ArrBGh57NIE6QuQFuMHc5_E62KOuWwbEpUpsLK3l6EZGZiITyPMvSg2pv0xfX16xhRIE-QmXfFoJmQ4sZ8L/s1600/IMG_20180629_103034.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1600&quot; data-original-width=&quot;1200&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5XVDzzKdNkFktfxm8dD6cs7rHg7qxjECKpUAanP0h_SXNn6wVODv2HF_D9ArrBGh57NIE6QuQFuMHc5_E62KOuWwbEpUpsLK3l6EZGZiITyPMvSg2pv0xfX16xhRIE-QmXfFoJmQ4sZ8L/s320/IMG_20180629_103034.jpg&quot; width=&quot;240&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt; &lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/1860162758985393604'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/1860162758985393604'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2018/07/know-your-adversary-towards.html' title='Know-Your-Adversary: Towards a Forensically-Aware Architecture for Analysing Malicious Insider Actions against Transactional Databases.'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDvUmnrkt9E0mj0MZmyktN7L0js7GW3m19eJCpGyolFaQpchBi_yIx0lll1RGmCZ-C2CPmybBggGv_uQUs-0i9_hJ8VSRHljn-vAkczPUerf1igglSIF8eXp6aQ-lqKiFYbKE-oktdCSDe/s72-c/IMG-20180629-WA0001.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-4149737311115356631</id><published>2018-01-06T08:09:00.000-08:00</published><updated>2018-01-18T08:10:18.589-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="My Life through Words"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><title type='text'>2018 Family Goals</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnAr6dB1IwPp9n-beDJWXiS45dzFkr62RNci74I2g5I-R0vRXPOrM59jA3LKjmb2gMyBLcQoxHlV22iUqMBmh9EWt9W6lIAa4jbREh9NDobFY0pt3ht4nzQA5eCHuP8cQ-Dy8QZ0jnb0M7/s1600/BST+Craft+Shop.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1123&quot; data-original-width=&quot;794&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnAr6dB1IwPp9n-beDJWXiS45dzFkr62RNci74I2g5I-R0vRXPOrM59jA3LKjmb2gMyBLcQoxHlV22iUqMBmh9EWt9W6lIAa4jbREh9NDobFY0pt3ht4nzQA5eCHuP8cQ-Dy8QZ0jnb0M7/s640/BST+Craft+Shop.jpg&quot; width=&quot;452&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/4149737311115356631'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/4149737311115356631'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2018/01/2018-family-goals.html' title='2018 Family Goals'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnAr6dB1IwPp9n-beDJWXiS45dzFkr62RNci74I2g5I-R0vRXPOrM59jA3LKjmb2gMyBLcQoxHlV22iUqMBmh9EWt9W6lIAa4jbREh9NDobFY0pt3ht4nzQA5eCHuP8cQ-Dy8QZ0jnb0M7/s72-c/BST+Craft+Shop.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-2651566340777408539</id><published>2017-10-25T20:00:00.000-07:00</published><updated>2020-07-27T22:15:29.023-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="My Life through Words"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><category scheme="http://www.blogger.com/atom/ns#" term="Reports"/><title type='text'>PhD Annual Progress Report - Year 2</title><content type='html'>&lt;div style=&quot;text-align: right;&quot;&gt;
Clama a mí, y yo te responderé, y te enseñaré cosas grandes y ocultas que tú no conoces.&lt;/div&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;
Jer. 33:3&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;511&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;https://www.slideshare.net/slideshow/embed_code/key/aLMii6KjCAoUFu&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;479&quot;&gt; &lt;/iframe&gt; &lt;/div&gt;
&lt;div style=&quot;margin-bottom: 5px; text-align: center;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;https://www.slideshare.net/secret/aLMii6KjCAoUFu&quot; target=&quot;_blank&quot; title=&quot;D.Flores - Annual Progress Report Y2&quot;&gt;D.Flores - Annual Progress Report Y2&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;https://www.slideshare.net/DenysAFlores&quot; target=&quot;_blank&quot;&gt;Denys A. Flores&lt;/a&gt;&lt;/b&gt; &lt;/div&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
To my wife Stacy, and my sons Liam and Josh&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&quot;Thank you for joining me in a journey beyond time, distance and feelings.&quot;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
I&#39;ve never been so grateful to God for having placed your lives in my path,&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
... and allowing me to be a part of yours.&lt;br /&gt;
&lt;br /&gt;
I know that it&#39;s not easy to handle ME... but without all of you, this whole sacrifice wouldn&#39;t have any meaning at all. Thanks for supporting me and bear with me... in spite of my ups and downs during my journey.&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/2651566340777408539'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/2651566340777408539'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2017/10/phd-annual-progress-report-year-2.html' title='PhD Annual Progress Report - Year 2'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-45846168265779054</id><published>2017-09-11T03:26:00.000-07:00</published><updated>2018-01-18T04:55:14.918-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><title type='text'>Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes (Article)</title><content type='html'>The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17, 2 August 2017.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Abstract&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
During forensic database investigations, audit
records become a crucial evidential element; particularly, when
certain events can be attributed to insider activity. However,
traditional reactive forensic methods may not be suitable, urging
the adoption of proactive approaches that can be used to ensure
accountability through audit records whilst satisfying Chain of
Custody (CoC) requirements for forensic purposes.
In this paper, role segregation, evidence provenance, event time-
liness and causality are considered as CoC requirements in order
to implement a forensically ready architecture for the proactive
generation, collection and preservation of database audit records
that can be used as digital evidence for the investigation of
insider activity. Our proposal implements triggers and stored
procedures as forensic routines in order to build a vector-clock-
based timeline for explaining causality in transactional events
recorded in audit tables. We expect to encourage further work
in the ﬁeld of proactive digital forensics and forensic readiness;
in particular, for justifying admissibility of audit records under
CoC restrictions.&lt;br /&gt;
&lt;br /&gt;
DOI: &lt;b&gt;&lt;/b&gt;
    &lt;a class=&quot;ng-binding ng-isolate-scope&quot; href=&quot;https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.299&quot; target=&quot;_blank&quot;&gt;10.1109/Trustcom/BigDataSE/ICESS.2017.299&lt;/a&gt; </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/45846168265779054'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/45846168265779054'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2017/10/implementing-chain-of-custody.html' title='Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes (Article)'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-200970350090573740</id><published>2017-08-02T03:34:00.000-07:00</published><updated>2018-01-18T05:21:56.442-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><title type='text'>Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes (Presentation)</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6jbq5wp6Vz_Om8Lie6BgnDSnSL_kaR0WDqze6lQ4LBI3Our2PXP35959V_yfXGgAEzhw_RATsIGOkhqY2fmiohE8K1H6Yi-TL1QmaROOj-6vt7gDyghi5hNcJpSb7b-zJekauEQIej3V4/s1600/trustcom17-1_edited.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1007&quot; data-original-width=&quot;1600&quot; height=&quot;201&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6jbq5wp6Vz_Om8Lie6BgnDSnSL_kaR0WDqze6lQ4LBI3Our2PXP35959V_yfXGgAEzhw_RATsIGOkhqY2fmiohE8K1H6Yi-TL1QmaROOj-6vt7gDyghi5hNcJpSb7b-zJekauEQIej3V4/s320/trustcom17-1_edited.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17) will be held in Sydney, Australia from 1st to 4th August, 2017. The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;356&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;https://www.slideshare.net/slideshow/embed_code/key/dft07yARLMmNa1&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;427&quot;&gt; &lt;/iframe&gt; &lt;br /&gt;
&lt;div style=&quot;margin-bottom: 5px;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;https://www.slideshare.net/secret/dft07yARLMmNa1&quot; target=&quot;_blank&quot; title=&quot;TrustCom-17-Paper ID 152&quot;&gt;TrustCom-17-Paper ID 152&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;https://www.slideshare.net/DenysAFlores&quot; target=&quot;_blank&quot;&gt;Denys A. Flores&lt;/a&gt;&lt;/b&gt; &lt;/div&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/200970350090573740'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/200970350090573740'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2017/10/implementing-chain-of-custody_23.html' title='Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes (Presentation)'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6jbq5wp6Vz_Om8Lie6BgnDSnSL_kaR0WDqze6lQ4LBI3Our2PXP35959V_yfXGgAEzhw_RATsIGOkhqY2fmiohE8K1H6Yi-TL1QmaROOj-6vt7gDyghi5hNcJpSb7b-zJekauEQIej3V4/s72-c/trustcom17-1_edited.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-3251928021906603942</id><published>2017-07-06T13:28:00.001-07:00</published><updated>2018-01-18T05:23:25.829-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><title type='text'>Proactive Database Forensics: Chain of Custody Requirements for Database Audit Records (WPCCS-17)</title><content type='html'>Presented in &lt;a href=&quot;http://www2.warwick.ac.uk/fac/sci/dcs/research/wpccs/wpccs17/&quot; target=&quot;_blank&quot;&gt;WPCCS-17&lt;/a&gt; on 30 June 2017.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoW-u-ByRPuYLZrYv45p4DybRlJHOm5AE9d-5lmlRNiwa10kpzYMDmz45nnQoUAMq12PSu4byHoN3aV-g8z5G9aXCsZfPizhr0mgyEW0Cb-MDGKQmAt22PXsWm7wptXuW50vwaox1MZQDV/s1600/wpccs-17-dflores.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1067&quot; data-original-width=&quot;1600&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoW-u-ByRPuYLZrYv45p4DybRlJHOm5AE9d-5lmlRNiwa10kpzYMDmz45nnQoUAMq12PSu4byHoN3aV-g8z5G9aXCsZfPizhr0mgyEW0Cb-MDGKQmAt22PXsWm7wptXuW50vwaox1MZQDV/s320/wpccs-17-dflores.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Abstract: &lt;/b&gt;In forensic database investigations, audit records are important 
evidence for analysing malicious activities carried out by trusted 
employees or insiders who may have misused their privileged access to 
sensitive transactional information. Our research proposes a proactive 
forensic approach for the generation, collection and preservation of 
audit records related to insider activity in order to ensure 
accountability whilst satisfying Chain of Custody (CoC) requirements. 
Hence, role segregation, evidence provenance, event timeliness and 
causality are considered as functional requirements for the 
implementation of a forensically ready architecture to proactively 
investigate insider activity. This architecture implements triggers and 
stored procedures as forensic routines for building a vector-clock-based
 timeline in order to explain causality in suspicious transactional 
events that can be attributed to malicious insiders.&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;iframe align=&quot;middle&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;511&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;https://www.slideshare.net/slideshow/embed_code/key/wc3xuNqnDwWwdV&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;479&quot;&gt; &lt;/iframe&gt; &lt;/div&gt;
&lt;div style=&quot;margin-bottom: 5px; text-align: center;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;https://www.slideshare.net/secret/wc3xuNqnDwWwdV&quot; target=&quot;_blank&quot; title=&quot;WPCCS-17 Poster&quot;&gt;WPCCS-17 Poster&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;https://www.slideshare.net/DenysAFlores&quot; target=&quot;_blank&quot;&gt;Denys A. Flores&lt;/a&gt;&lt;/b&gt; &lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/3251928021906603942'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/3251928021906603942'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2017/07/proactive-database-forensics-chain-of.html' title='Proactive Database Forensics: Chain of Custody Requirements for Database Audit Records (WPCCS-17)'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoW-u-ByRPuYLZrYv45p4DybRlJHOm5AE9d-5lmlRNiwa10kpzYMDmz45nnQoUAMq12PSu4byHoN3aV-g8z5G9aXCsZfPizhr0mgyEW0Cb-MDGKQmAt22PXsWm7wptXuW50vwaox1MZQDV/s72-c/wpccs-17-dflores.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-1608136670545267730</id><published>2017-02-09T17:13:00.000-08:00</published><updated>2018-01-18T07:11:37.878-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><title type='text'>4th International Workshop on Cybercrimes and Emerging Web Environments - CEWE2017 in conjunction with 10th IEEE International Conference on Cyber, Physical and Social Computing (CPSCom-2017).</title><content type='html'>2017 - Technical Committee Member. Exeter, United Kingdom&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;356&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;https://www.slideshare.net/slideshow/embed_code/key/4V3JsouGnkNmWa&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;427&quot;&gt; &lt;/iframe&gt; &lt;/div&gt;
&lt;div style=&quot;margin-bottom: 5px; text-align: center;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;https://www.slideshare.net/secret/4V3JsouGnkNmWa&quot; target=&quot;_blank&quot; title=&quot;Cewe2017-technical committee&quot;&gt;Cewe2017-technical committee&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;https://www.slideshare.net/DenysAFlores&quot; target=&quot;_blank&quot;&gt;Denys A. Flores&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbBQ4JD1oga87vD8QRrfTZCVdp1-8O55Mi87rnHfoyX9-8lsDyRUD7_3pWaNEnahvM6mqxrAn4MiyDY-IRae9OXvTHuf_B-5RGmya2XyCBfapbPEaWuflMfhHbawLYNOvzEVFSmh9KmTIC/s1600/CEWE2017.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;703&quot; data-original-width=&quot;1144&quot; height=&quot;392&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbBQ4JD1oga87vD8QRrfTZCVdp1-8O55Mi87rnHfoyX9-8lsDyRUD7_3pWaNEnahvM6mqxrAn4MiyDY-IRae9OXvTHuf_B-5RGmya2XyCBfapbPEaWuflMfhHbawLYNOvzEVFSmh9KmTIC/s640/CEWE2017.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/1608136670545267730'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/1608136670545267730'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2017/02/4th-international-workshop-on.html' title='4th International Workshop on Cybercrimes and Emerging Web Environments - CEWE2017 in conjunction with 10th IEEE International Conference on Cyber, Physical and Social Computing (CPSCom-2017).'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbBQ4JD1oga87vD8QRrfTZCVdp1-8O55Mi87rnHfoyX9-8lsDyRUD7_3pWaNEnahvM6mqxrAn4MiyDY-IRae9OXvTHuf_B-5RGmya2XyCBfapbPEaWuflMfhHbawLYNOvzEVFSmh9KmTIC/s72-c/CEWE2017.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-788527032626053502</id><published>2017-02-09T09:09:00.000-08:00</published><updated>2018-01-18T05:25:32.465-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><title type='text'>Bring Your Own Disclosure: Analysing BYOD Threats to Corporate Information (Article)</title><content type='html'>The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 25 August 2016.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Abstract&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Mobile device consumerisation has introduced the Bring-Your-Own-Device (BYOD) trend to the organisational context, allowing employees to work using their personal devices. However, as personal mobile devices are perceived as less secure than those provided by the organisation, BYOD has risen security concerns about corporate information being accessed by mobile devices from inside and outside the corporate perimeter. Moreover, this uncontrolled mobile device activity makes it difficult to differentiate external (outsider) malicious activity from reckless/naive employee (insider) behaviour, preventing effective correlation of unauthorised actions with the perpetrators. In this paper, a STRIDE-based BYOD Threat Model is proposed to analyse BYOD Threat Interactions from inside and outside the corporate perimeter. Our research contributes to a better understanding and awareness about the influence of BYOD Threats on disclosure and contamination of corporate information, encouraging future work in the field of BYOD security and digital forensics in order to protect information and manage an increasing number of evidence sources.&lt;br /&gt;
&lt;br /&gt;
DOI: &lt;a class=&quot;ng-binding&quot; href=&quot;https://doi.org/10.1109/TrustCom.2016.0169&quot; target=&quot;_blank&quot;&gt;10.1109/TrustCom.2016.0169&lt;/a&gt; </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/788527032626053502'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/788527032626053502'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2017/02/bring-your-own-disclosure-analysing.html' title='Bring Your Own Disclosure: Analysing BYOD Threats to Corporate Information (Article)'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-8539085936207138174</id><published>2017-01-20T04:03:00.000-08:00</published><updated>2017-01-23T04:06:19.331-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><category scheme="http://www.blogger.com/atom/ns#" term="RSSP Workshops - Y2"/><title type='text'>CH933 - Academic Scientific Writing: Writing extended scientific articles and reports</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;iframe align=&quot;middle&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;511&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;https://www.slideshare.net/slideshow/embed_code/key/goXFgc4WrnD14r&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;479&quot;&gt; &lt;/iframe&gt; &lt;/div&gt;
&lt;div style=&quot;margin-bottom: 5px; text-align: left;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;https://www.slideshare.net/secret/goXFgc4WrnD14r&quot; target=&quot;_blank&quot; title=&quot;Refelctions on Module CH933 - Writing Extended Scientific Articles and Reports&quot;&gt;Reflections on Module CH933 - Writing Extended Scientific Articles and Reports&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;http://www.slideshare.net/DenysAFlores&quot; target=&quot;_blank&quot;&gt;Denys A. Flores&lt;/a&gt;&lt;/b&gt; &lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/8539085936207138174'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/8539085936207138174'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2017/01/ch933-academic-scientific-writing.html' title='CH933 - Academic Scientific Writing: Writing extended scientific articles and reports'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-4763301302708105037</id><published>2017-01-03T10:29:00.001-08:00</published><updated>2018-01-18T05:31:03.841-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="My Life through Words"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><title type='text'>2017 Family Goals</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3lidcyAEEQ2_OnMuF3YT5fbJu2nyJm9Lt3UxVl60lXFrgTm_Ruz8MmhxIK12-0R1i8NzKw48UQ6j7QaBdSclgNlh4n6E-lTwkYWD52zqIqsGIybgOLbp5n2NuutanPlyIGUYRcKDJGdqk/s1600/IMG_20180108_135735.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1123&quot; data-original-width=&quot;794&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3lidcyAEEQ2_OnMuF3YT5fbJu2nyJm9Lt3UxVl60lXFrgTm_Ruz8MmhxIK12-0R1i8NzKw48UQ6j7QaBdSclgNlh4n6E-lTwkYWD52zqIqsGIybgOLbp5n2NuutanPlyIGUYRcKDJGdqk/s640/IMG_20180108_135735.png&quot; width=&quot;452&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/4763301302708105037'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/4763301302708105037'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2017/01/2017-family-goals.html' title='2017 Family Goals'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3lidcyAEEQ2_OnMuF3YT5fbJu2nyJm9Lt3UxVl60lXFrgTm_Ruz8MmhxIK12-0R1i8NzKw48UQ6j7QaBdSclgNlh4n6E-lTwkYWD52zqIqsGIybgOLbp5n2NuutanPlyIGUYRcKDJGdqk/s72-c/IMG_20180108_135735.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-7914329836899772763</id><published>2016-12-13T18:26:00.001-08:00</published><updated>2018-01-18T05:51:42.435-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="My Life through Words"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><title type='text'>My Very Best Friend</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyI7HjO06P2PU_sVIptS9YewKVJqw2moZaFavWllk-E_n4hYqEx5k9rF32V_mee6KYYre0HxBxDxq6o-FrNr-f1NGNipldsyFQRXDcRyg8-lGuUefF-WQIdV7FugOAP6mdR_6nr9TNRfuF/s1600/my-bf.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1458&quot; data-original-width=&quot;1458&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyI7HjO06P2PU_sVIptS9YewKVJqw2moZaFavWllk-E_n4hYqEx5k9rF32V_mee6KYYre0HxBxDxq6o-FrNr-f1NGNipldsyFQRXDcRyg8-lGuUefF-WQIdV7FugOAP6mdR_6nr9TNRfuF/s200/my-bf.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
The two of us... just us... standing on a corner watching the sky.&lt;br /&gt;
While you discover the world, I learn about it through your eyes.&lt;br /&gt;
You say to me amazing things, those crazy little things that make me laugh...&lt;br /&gt;
You draw with your hands subtle thin lines on that infinite blue sky.&lt;br /&gt;
&lt;br /&gt;
And so... the minutes pass by... we are just there standing... watching... laughing...&lt;br /&gt;
The time is over us... quick! we need to find a place to sit!&lt;br /&gt;
You hold my hand and run faster and faster, unlike me, who every second now runs slower.&lt;br /&gt;
Then, we enter the place where dreams come true, and suddenly you smile...&lt;br /&gt;
&lt;br /&gt;
You are my best friend, you said... and my heart melts... my life and my very existence makes sense.&lt;br /&gt;
While you laugh at the puppets, I wonder how you manage to take my burdens away....&lt;br /&gt;
And I still wonder for how long I may be your best friend... I hope forever...&lt;br /&gt;
&lt;br /&gt;
Although it doesn&#39;t matter for how long... just please let me be there by your side;&lt;br /&gt;
Let me stand there with you on the last days of my life, so I can remember...&lt;br /&gt;
So I can still remember that day when your sky was mine, and I was yours...&lt;br /&gt;
Forever you, my very best friend.&lt;br /&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/7914329836899772763'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/7914329836899772763'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2016/12/my-very-best-friend.html' title='My Very Best Friend'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyI7HjO06P2PU_sVIptS9YewKVJqw2moZaFavWllk-E_n4hYqEx5k9rF32V_mee6KYYre0HxBxDxq6o-FrNr-f1NGNipldsyFQRXDcRyg8-lGuUefF-WQIdV7FugOAP6mdR_6nr9TNRfuF/s72-c/my-bf.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-1667065621938902847</id><published>2016-09-13T18:00:00.000-07:00</published><updated>2020-07-27T22:15:57.650-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="My Life through Words"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><category scheme="http://www.blogger.com/atom/ns#" term="Reports"/><title type='text'>PhD Upgrade Report - Year 1</title><content type='html'>It&#39;s been a long journey... so far away from home.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;iframe align=&quot;middle&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;511&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;https://www.slideshare.net/slideshow/embed_code/key/smtxcJrtdAkWn0&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;479&quot;&gt; &lt;/iframe&gt; &lt;/div&gt;
&lt;div style=&quot;margin-bottom: 5px; text-align: center;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;https://www.slideshare.net/secret/smtxcJrtdAkWn0&quot; target=&quot;_blank&quot; title=&quot;D.Flores - Upgrade Report&quot;&gt;D.Flores - Upgrade Report&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;https://www.slideshare.net/DenysAFlores&quot; target=&quot;_blank&quot;&gt;Denys A. Flores&lt;/a&gt;&lt;/b&gt; &lt;/div&gt;
&lt;br /&gt;
Dedicado a&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;
Rolando, Wilson, Fidel &amp;amp; William ... Los hombres más sabios e inteligentes&lt;/div&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;
que he conocido en mi vida.&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/1667065621938902847'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/1667065621938902847'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2017/09/phd-upgrade-report-year-1.html' title='PhD Upgrade Report - Year 1'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-4163266274597502426</id><published>2016-09-12T06:36:00.004-07:00</published><updated>2018-01-18T05:26:41.836-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><title type='text'>Bring Your Own Disclosure: Analysing BYOD Threats to Corporate Information (Presentation)</title><content type='html'>&lt;br /&gt;
The &lt;a href=&quot;http://adnet.tju.edu.cn/TrustCom2016/&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16)&lt;/b&gt;&lt;/a&gt; was held in Tianjin, China on 23-26 August, 2016. The conference aimed at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.&lt;br /&gt;
&lt;br /&gt;
Again, I was honoured to be accepted to present my research results in this prestigious academic conference in which I already participated back in 2012. This year&#39;s conference inlcuded a specific track for digital forensics which I was totally amazed to be in. There is a lot of work being performed in the digital forensics field, particularly focused on mobile devices and volatile evidence recovery. I am quite exited to see what the future brings on.&lt;br /&gt;
&lt;br /&gt;
&lt;iframe align=&quot;middle&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;485&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;//www.slideshare.net/slideshow/embed_code/key/wCscgqkcILqetC&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;595&quot;&gt; &lt;/iframe&gt; &lt;br /&gt;
&lt;div style=&quot;margin-bottom: 5px;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;https://www.slideshare.net/DenysAFlores/trustcom16-paper-id-227&quot; target=&quot;_blank&quot; title=&quot;TrustCom-16 - Paper ID 227&quot;&gt;TrustCom-16 - Paper ID 227&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;https://www.slideshare.net/DenysAFlores&quot; target=&quot;_blank&quot;&gt;Denys A. Flores&lt;/a&gt;&lt;/b&gt; &lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/4163266274597502426'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/4163266274597502426'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2016/09/blog-post.html' title='Bring Your Own Disclosure: Analysing BYOD Threats to Corporate Information (Presentation)'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-4674866166463032013</id><published>2016-07-01T18:00:00.000-07:00</published><updated>2018-01-18T05:45:09.805-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><title type='text'>WPCCS 2016 - Price Winner</title><content type='html'>&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7wDAt-Xt4TVc1W1gym-TyZOPRZKzPbEO3CLdglot1juOT4k2h09i2QFWmc_Sf7HQ7cXV0ACFqTTDWIwtzwfEIRoeUaohBKcm0_c_8i5VXXAyKZM6_LVe6uBTyiUhGJrq36ftgouEEzfgx/s1600/wpccs-16-pwinner.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;908&quot; data-original-width=&quot;1171&quot; height=&quot;496&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7wDAt-Xt4TVc1W1gym-TyZOPRZKzPbEO3CLdglot1juOT4k2h09i2QFWmc_Sf7HQ7cXV0ACFqTTDWIwtzwfEIRoeUaohBKcm0_c_8i5VXXAyKZM6_LVe6uBTyiUhGJrq36ftgouEEzfgx/s640/wpccs-16-pwinner.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Original Page Screenshot from warwick[dot]ac[dot]uk&lt;br /&gt;
Last Accessed: 18/01/2018&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/4674866166463032013'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/4674866166463032013'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2016/07/functiond-s-id-var-js-fjs-d.html' title='WPCCS 2016 - Price Winner'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7wDAt-Xt4TVc1W1gym-TyZOPRZKzPbEO3CLdglot1juOT4k2h09i2QFWmc_Sf7HQ7cXV0ACFqTTDWIwtzwfEIRoeUaohBKcm0_c_8i5VXXAyKZM6_LVe6uBTyiUhGJrq36ftgouEEzfgx/s72-c/wpccs-16-pwinner.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-614906946095358171</id><published>2016-07-01T06:36:00.000-07:00</published><updated>2018-01-18T05:33:41.332-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><title type='text'>Proactive Database Forensics in the BYOD Era - An Overview (WPCCS-16)</title><content type='html'>The &lt;a href=&quot;http://www2.warwick.ac.uk/fac/sci/dcs/research/wpccs/&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;Warwick Postgraduate Colloquium&lt;/b&gt;&lt;/a&gt; is an annual event held in the &lt;b&gt;&lt;a href=&quot;http://www2.warwick.ac.uk/fac/sci/dcs/&quot; target=&quot;_blank&quot;&gt;Department of Computer Science&lt;/a&gt;&lt;/b&gt; which brings together postgraduate researchers from Computer Science and the Centre for Scientific Computing to present recent and on-going research.&lt;br /&gt;
&lt;br /&gt;
I had the pleasure to participate in the WPCCS 2016 as it is compulsory for all research students in Computer Science in order to upgrade from an MPhil to a PhD.I talked about my preliminary research in the field of proactive database forensics along with the security and forensics implications of the Bring-Your-Own-Device (BYOD) paradigm. &lt;a href=&quot;http://www2.warwick.ac.uk/fac/sci/dcs/research/wpccs/wpccs16/prizewinners/&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;My presentation was selected as Best Presentation in my track&lt;/b&gt;&lt;/a&gt;. This made me feel very honoured because all the work done by my colleagues at Warwick DCS is amazing with high academic standards, so being considered one of the best amongst the best is trully a very delightful experience.&lt;br /&gt;
&lt;br /&gt;
&lt;iframe align=&quot;middle&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;485&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;//www.slideshare.net/slideshow/embed_code/key/xLX8yTuAXnuzk7&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;595&quot;&gt; &lt;/iframe&gt; &lt;br /&gt;
&lt;div style=&quot;margin-bottom: 5px;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;https://www.slideshare.net/DenysAFlores/wpccs-16-presentation&quot; target=&quot;_blank&quot; title=&quot;WPCCS 16 Presentation&quot;&gt;WPCCS 16 Presentation&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;https://www.slideshare.net/DenysAFlores&quot; target=&quot;_blank&quot;&gt;Denys A. Flores&lt;/a&gt;&lt;/b&gt; &lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/614906946095358171'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/614906946095358171'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2016/09/proactive-database-forensics-in-byod.html' title='Proactive Database Forensics in the BYOD Era - An Overview (WPCCS-16)'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-5119301199929611299</id><published>2016-06-08T07:11:00.001-07:00</published><updated>2016-06-08T07:12:26.524-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><title type='text'>Incident Response and the Rise of Organizational Doxing: Ask Bruce, epis...</title><content type='html'>This video explains in a very understandable way why data (information) security breaches are dangerous. Here, Bruce Schneir also explains that this danger is usually related to the lack of effective incident response strategies inside organisations.&lt;br /&gt;
&lt;br /&gt;
&lt;iframe align=&quot;middle&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;270&quot; src=&quot;https://www.youtube.com/embed/4goasB_05H4&quot; width=&quot;480&quot;&gt;&lt;/iframe&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/5119301199929611299'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/5119301199929611299'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2016/06/incident-response-and-rise-of.html' title='Incident Response and the Rise of Organizational Doxing: Ask Bruce, epis...'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/4goasB_05H4/default.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-8463872216571745590</id><published>2016-05-05T05:15:00.000-07:00</published><updated>2016-05-05T05:15:52.996-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><title type='text'>A Proactive Approach to Database Forensics</title><content type='html'>&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;485&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;//www.slideshare.net/slideshow/embed_code/key/Gx175WKe83ccTz&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;595&quot;&gt; &lt;/iframe&gt; &lt;br /&gt;
&lt;div style=&quot;margin-bottom: 5px;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;https://www.slideshare.net/secret/Gx175WKe83ccTz&quot; target=&quot;_blank&quot; title=&quot;Database forensics&quot;&gt;Database forensics&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;https://www.slideshare.net/DenysAFlores&quot; target=&quot;_blank&quot;&gt;Denys A. Flores&lt;/a&gt;&lt;/b&gt; &lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/8463872216571745590'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/8463872216571745590'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2016/05/a-proactive-approach-to-database.html' title='A Proactive Approach to Database Forensics'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-6593579035028722933</id><published>2016-03-15T06:35:00.000-07:00</published><updated>2016-03-17T09:28:33.300-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><title type='text'>How Meditation can help on Anxiety</title><content type='html'>&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;

Hello again :-)&lt;br /&gt;
&lt;br /&gt;
I haven´t written in a while... I´ve been trying to find time to study and
support my wife during her pregnancy... It hasn´t been easy to adapt to changes
and try to find balance in between my personal and student life.&lt;br /&gt;
&lt;br /&gt;
My first semester in University has been... well... full of anxiety. It&#39;s
the first time I have experienced high levels of anxiety. My advisors told me
that it is mainly because of the changes I am going through at the moment.
Being a father and a student is very hard, because your previous experiences as
a student were some years ago, and back then you didn´t have others depending
on you. Well, in short, all these changes have affected a lot the way I manage
my research and my time. The first stages to &quot;get used to a new
routine&quot; are hard, and sometimes get you by surprise, unexpectedly. If you
don´t do something to manage your adaptation process, it will start to affect
everything around you. The first symptom I detected was my anxiety levels
rising to the point of confusion and lack of action.&lt;br /&gt;
&lt;br /&gt;
Because of the previous background, one month ago I began to attend
meditation lessons at the University. To be honest, I was skeptical at the
beginning because I thought that meditation is not very helpful. I was wrong...
After the first week of practising meditation, I was able to find stability in
my life and reduce my anxiety levels drastically. Incorporating breathing and
muscle relaxation techniques in my daily routine has helped me a lot. These
techniques are also useful when combined with gratitude and love feelings,
enable your brain to disseminate these feelings to your whole body. I am not
an expert in the field, but I can recommend this &lt;a href=&quot;http://www.cottagetherapycentre.co.uk/peter.html&quot; target=&quot;_blank&quot;&gt;web
site&lt;/a&gt; that refers to my meditation teacher Peter Keyton-Hook.&lt;br /&gt;
&lt;br /&gt;
I recommend practising and applying these meditation techniques in
your life, particularly if you are going through overwhelming changes that
trigger your anxiety levels. Remember that to beat anxiety and bring your life
back to normal, you must do something about it. Talking helps a lot, so having
your loved ones around you can make a significant change. Also, trying new
techniques like meditation can help you boosting your positive feelings and use
them to mitigate the negative ones when they are becoming an issue.&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-GB&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val=&quot;Cambria Math&quot;/&gt;
   &lt;m:brkBin m:val=&quot;before&quot;/&gt;
   &lt;m:brkBinSub m:val=&quot;&amp;#45;-&quot;/&gt;
   &lt;m:smallFrac m:val=&quot;off&quot;/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val=&quot;0&quot;/&gt;
   &lt;m:rMargin m:val=&quot;0&quot;/&gt;
   &lt;m:defJc m:val=&quot;centerGroup&quot;/&gt;
   &lt;m:wrapIndent m:val=&quot;1440&quot;/&gt;
   &lt;m:intLim m:val=&quot;subSup&quot;/&gt;
   &lt;m:naryLim m:val=&quot;undOvr&quot;/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState=&quot;false&quot; DefUnhideWhenUsed=&quot;false&quot;
  DefSemiHidden=&quot;false&quot; DefQFormat=&quot;false&quot; DefPriority=&quot;99&quot;
  LatentStyleCount=&quot;371&quot;&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; QFormat=&quot;true&quot; Name=&quot;Normal&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Normal Indent&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;footnote text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;annotation text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;header&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;footer&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index heading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;35&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;caption&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;table of figures&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;envelope address&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;envelope return&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;footnote reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;annotation reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;line number&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;page number&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;endnote reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;endnote text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;table of authorities&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;macro&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;toa heading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;10&quot; QFormat=&quot;true&quot; Name=&quot;Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Closing&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Signature&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;Default Paragraph Font&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text Indent&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Message Header&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;11&quot; QFormat=&quot;true&quot; Name=&quot;Subtitle&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Salutation&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Date&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text First Indent&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text First Indent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Note Heading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text Indent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text Indent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Block Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Hyperlink&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;FollowedHyperlink&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;22&quot; QFormat=&quot;true&quot; Name=&quot;Strong&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;20&quot; QFormat=&quot;true&quot; Name=&quot;Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Document Map&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Plain Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;E-mail Signature&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Top of Form&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Bottom of Form&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Normal (Web)&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Acronym&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Address&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Cite&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Code&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Definition&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Keyboard&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Preformatted&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Sample&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Typewriter&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Variable&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Normal Table&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;annotation subject&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;No List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Outline List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Outline List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Outline List 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Simple 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Simple 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Simple 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Colorful 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Colorful 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Colorful 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table 3D effects 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table 3D effects 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table 3D effects 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Contemporary&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Elegant&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Professional&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Subtle 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Subtle 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Web 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Web 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Web 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Balloon Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;Table Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Theme&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; Name=&quot;Placeholder Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; QFormat=&quot;true&quot; Name=&quot;No Spacing&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; Name=&quot;Revision&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;34&quot; QFormat=&quot;true&quot;
   Name=&quot;List Paragraph&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;29&quot; QFormat=&quot;true&quot; Name=&quot;Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;30&quot; QFormat=&quot;true&quot;
   Name=&quot;Intense Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;19&quot; QFormat=&quot;true&quot;
   Name=&quot;Subtle Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;21&quot; QFormat=&quot;true&quot;
   Name=&quot;Intense Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;31&quot; QFormat=&quot;true&quot;
   Name=&quot;Subtle Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;32&quot; QFormat=&quot;true&quot;
   Name=&quot;Intense Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;33&quot; QFormat=&quot;true&quot; Name=&quot;Book Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;37&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;Bibliography&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;TOC Heading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;41&quot; Name=&quot;Plain Table 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;42&quot; Name=&quot;Plain Table 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;43&quot; Name=&quot;Plain Table 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;44&quot; Name=&quot;Plain Table 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;45&quot; Name=&quot;Plain Table 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;40&quot; Name=&quot;Grid Table Light&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot; Name=&quot;Grid Table 1 Light&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot; Name=&quot;Grid Table 6 Colorful&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot; Name=&quot;Grid Table 7 Colorful&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot; Name=&quot;List Table 1 Light&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot; Name=&quot;List Table 6 Colorful&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot; Name=&quot;List Table 7 Colorful&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 6&quot;/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:&quot;Table Normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
 mso-para-margin-top:0cm;
 mso-para-margin-right:0cm;
 mso-para-margin-bottom:8.0pt;
 mso-para-margin-left:0cm;
 line-height:107%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:&quot;Calibri&quot;,sans-serif;
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;
 mso-fareast-language:EN-US;}
&lt;/style&gt;
&lt;![endif]--&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/6593579035028722933'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/6593579035028722933'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2016/03/how-meditation-can-help-on-anxiety.html' title='How Meditation can help on Anxiety'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-526983949459721993</id><published>2016-02-16T07:36:00.002-08:00</published><updated>2016-03-15T06:02:00.881-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><title type='text'>When God and Life Surprise You</title><content type='html'>It&#39;s been a while since my last post... Honestly, it is very hard to find time to post something, and sometimes your mind just go blank!

Well, news about me... I must said that finally, I did it! I took a step forward and decided to come back to England to do my PhD at the University of Warwick...&lt;br /&gt;
&lt;br /&gt;
How do I feel about it? Well... very pleased and happy for having been accepted in this University... a dream come true!

On the other hand... there&#39;s also the challenge ahead that makes you think if you are ready for this... I&#39;ve been asking this myself and sometimes I don&#39;t feel ready or &#39;good enough&#39; to do it. However, there are inner motivations higher than myself that drives me and pushes me to surpass my own expectations... First, there is God telling me that He will be in control of all my circumstances in my life, including this PhD. Second, there is my wife and my son who are always encouraging me to keep moving and after a long day, they are always there to give me a hug and a smile... I see God in their faces everyday. There are also my family and friends who are with me every time when I remember the memories shared with them... There is nothing like that warming feeling of belonging and gratitude with everyone who makes your life special, although you may be miles away from the people you care the most. God and life are two interdependent aspects, characteristics, beings (whatever you may call them) that makes your existence a rewarding experience, which moves in between reality and ethereal existence... soul, mind, body, ideas... everything that they represent comes from inside and if you let them drive your motivation, you may find that enjoying what you do, even when you don&#39;t feel suitable enough, doesn&#39;t depend on how you feel about it.&lt;br /&gt;
&lt;br /&gt;
Making progress is sometimes not about having results and success all the time... In my first steps on becoming a researcher, I must say that your mistakes, your ups and lows... everything makes you learn and helps you to become a better you, if only you are willing to embrace all the positive and negative aspects of the process.

Now that I&#39;m back on my beloved England, I must face the huge challenge of my life... I must defeat my own self and leave behind every fear, every wish of giving up... I must move forward... At the beginning it is hard... it really puts your heart to test, but once you stop thinking about the long path ahead, you can enjoy the journey and embrace adventure...&lt;br /&gt;
&lt;br /&gt;
Becoming a researcher is more than a dream, for me, it is the means that God will use to surprise me... for me, it is the power of determination to achieve something that will make my family proud. Life can be hard, but good enough to give it a try.</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/526983949459721993'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/526983949459721993'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2016/02/when-god-and-life-surprise-you.html' title='When God and Life Surprise You'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry></feed>