A simulated criminal attack | IET Conference Publication | IEEE Xplore