Figure 1: Attack nodes.
Back to Article
Copyright © 1999, Dr. Dobb's Journal