Network reconnaissance
Network Security
Siraj A. Shaikh
Hao Chen
John A. Clark
Philip Nobles
Exploring Attack Vectors Facilitated by Miniaturized Computers