On Node Capturing Attacker Strategies (Transcript of Discussion)
2014 ◽
pp. 316-320