On Node Capturing Attacker Strategies
2014 ◽
pp. 300-315
◽