Cover V11, I08
aug2002.tar

Figure 2 Graph of the persistance of attacks