A case study on hunting a brilliant hacker | IEEE Conference Publication | IEEE Xplore