Summary
Report on application of the propagation modelto security vulnerabilities
More information & hyperlinks