<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- created with Free Online Sitemap Generator www.xml-sitemaps.com -->

<url>
  <loc>http://datadrivensecurity.info/blog/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/pages/about-dds.html</loc>
  <lastmod>2014-12-15T18:00:59+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/pages/dds-dataset-collection.html</loc>
  <lastmod>2014-12-15T18:00:59+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/pages/musings.html</loc>
  <lastmod>2014-12-15T18:00:59+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/pages/resources.html</loc>
  <lastmod>2014-12-15T18:00:59+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/pages/subscribe.html</loc>
  <lastmod>2014-12-15T18:00:59+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/pages/the-book-and-podcast.html</loc>
  <lastmod>2014-12-15T18:00:59+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/pages/topic-request.html</loc>
  <lastmod>2014-12-15T18:00:59+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/archives.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Dec/bar-hopping-in-excel/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/blog.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/vis.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/excel.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/pie.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/bar.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/bar-chart.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/chart.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/dashboard.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Dec/ponemon/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/r.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/rstats.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Dec/shell-script-to-build-'shiny-apps'-from-github-gists/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Nov/os-x-yosemite-r-apps/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/os-x.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/yosemite.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Nov/hubbard/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Oct/roll-your-own-ip-attack-graphs/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/datavis.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/d3.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/security.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Oct/don't-worry-too-much-about-the-gallup-crime-poll/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/survey.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/rstat.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Oct/dga-part3/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Sep/dga-part1/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Oct/dga-part2/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/index2.html</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jan/blander-part1/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Sep/installing-dplyr-0.3-on-mac-os-x/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Sep/do-you-want-to-steal-a-snowman/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Sep/migrating-to-rvest/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Sep/mapping-ipv4/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Sep/keep-your-team-informed-with-slackr/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Aug/how-unusual-is-it-for-tlds-to-resolve-to-an-address-at-the-top-most-level/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Aug/statebins-mapping-the-us-without-maps/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Aug/book-bug-graph-cc/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Aug/announcing-dtupdate-r-package-updater-for-the-devtools-universe/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Aug/open-iterm-to-a-directory-from-r/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Aug/update-to-resolve-valgrind-and-r/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Aug/new-and-updated-r-packages-for-security-data-science/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Aug/parsing-domain-names-in-R/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Aug/basic-forward-and-reverse-lookups-in-r-with-rcpp/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jul/data-driven-security-50-off/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jul/density-plots-in-the-wild-and-court-briefs/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jun/controlling-rstudio-python-child-processes/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jun/marx-ports/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jun/can-you-track-me-now-part-2/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jun/alienvault-longitudinal-study-part-4/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jun/can-you-track-me-now-part-1/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/May/vectorizing-ipv4-address-conversions-part-2/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/May/vectorizing-ipv4-address-conversions-part-1/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/May/speeding-up-ipv4-address-conversion-in-r/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/May/dbir-mds/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/May/another-way-to-use-r-in-your-enterprise/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Apr/marxvideo/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Apr/scraping-ssl-server-test-results-with-r/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Apr/making-better-dns-txt-record-lookups-with-rcpp/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Apr/firewall-busting-asn-lookups/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Apr/crls-heartbleed-and-the-sad-state-of-ssl/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Apr/four-hbr-data-stories-worth-reading/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Apr/video-in-R/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Apr/when-bar-graphs-go-awry/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Apr/more-than-one-way-to-skin-a-data-frame-subset/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Apr/alienvault-longitudinal-study-part-3/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Apr/breaking-2014-dbir-preview/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Mar/data-driven-security-translations/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Mar/alienvault-longitudinal-study-part-2/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Mar/metricon-9-storified/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Feb/metricon-9-final-program-agenda/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Feb/new-book-site-up/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Feb/monitoring-credential-dumps-plus-using-twitter-as-a-data-source/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Feb/alienvault-longitudinal-study-part-1/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Feb/data-driven-security-linkedin-page/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Feb/reproducible-research-sucuri-darkleech-data/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Feb/data-driven-security-in-ibooks-bookstore/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Feb/ripal/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Feb/10-twitter-resources-for-security-data-science/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Feb/boxplots-for-everyone/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jan/dds-on-nook-kobo/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jan/dds-on-google-books/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jan/dds-podcast-episode-2/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jan/weathering-the-data-storm/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jan/blander-part2/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jan/malicious-cartography-part-1/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jan/solvo-mediocris/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jan/severski/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jan/the-data-science-love-child-of-doom/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jan/the-timing-of-cyber-conflict/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jan/dds-podcast-episode-1/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jan/data-exploration-in-r/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jan/top10-threat-actions/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jan/dds-podcast-on-stitcher/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jan/r-vs-spreadsheets/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/posts/2014/Jan/dds-github/</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/blog2.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/spreadsheets.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/dplyr.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/torrentfreak.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/bittorrent.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/pirate.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/tlapd.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/movies.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/r2.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/rstats2.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/geoip.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/wifi.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/cartography.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/maps.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/rcurl.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/dataviz.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/alienvault.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/data-analysis-data-management.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/hbr.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/data-analysis.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/twitter.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/data-visualization.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/passwords.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/datavis2.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/map.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/vcdb.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/book.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/python.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/ipython.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/pandas.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/rvest.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/slack.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/notifications.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/dns.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/tlds.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/mapping.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/heatmap.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/cartogram.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/bug.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/devtools.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/github.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/iterm.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/osx.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/index.html</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/index3.html</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/eda.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/analysis.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/honeypot.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/valgrind.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/rcpp.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/sale.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/rstudio.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/video.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/marx.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/mds.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/enterprise.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/data-munging.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/xml.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/scraping.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/asn.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/ip.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/ssl.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/heartbleed.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/contest.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/visualization.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/fundamentals.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/dbir.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/metricon.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/storify.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/extra/metricon9-agenda.pdf</loc>
  <lastmod>2014-12-15T18:00:56+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/data-management.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/reproducible-research.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/botnet.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/data-science.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/shiny.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/podcast.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/vis/malmaps-d3/index.html</loc>
  <lastmod>2014-12-15T18:00:56+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/simluation.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/prediction.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/weis.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/r3.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/rstats3.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/index4.html</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/r4.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/rstats4.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/index5.html</loc>
  <lastmod>2014-12-15T18:00:57+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/tag/r5.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/index6.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/index7.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
<url>
  <loc>http://datadrivensecurity.info/blog/index8.html</loc>
  <lastmod>2014-12-15T18:00:58+00:00</lastmod>
</url>
</urlset>
