[1]
. Planning to Discover and Counteract Attacks. Informatica. 34, 2 ().