H Xia, J Kanchana, JC Brustoloni - … , Waterloo, Canada, May 2-6, 2005 …, 2005 - Springer
Enterprise firewalls can be easily circumvented, eg by attack agents aboard infected mobile
computers or telecommuters' computers, or by attackers exploiting rogue access points or …