Network reconnaissance
Network Security
Siraj A. Shaikh
Hao Chen
Philip Nobles
Howard Chivers
Exploring Attack Vectors Facilitated by Miniaturized Computers