Evolution of an attacker's footprint wihin the target network
Evolution of an attacker's footprint wihin the target network