Surviving a Cyber Attack

This publication and the abstract below was published by [...]