Fig. 3From: Recovering user-interactions of Rich Internet Applications through replaying of HTTP tracesPortion of the HTTP log for an attack scenarioBack to article page