Network reconnaissance
Network Security
Siraj A. Shaikh
Hao Chen
John A. Clark
Howard Chivers
Exploring Attack Vectors Facilitated by Miniaturized Computers