Methodology for analyzing the compromise of a deployed tactical network | IEEE Conference Publication | IEEE Xplore