dfirr

A Note on R How-to in Cybersecurity Investigation