Issue No. 03 - May/June (2002 vol. 4)
<p>Tracing network attack depends on following a convoluted trail of packets and computer sessions back to their origin--a complex, multifaceted problem.</p>
S. C. Lee and C. Shields, "Technical, Legal, and Societal Challenges to Automated Attack Traceback," in IT Professional, vol. 4, no. , pp. 12-18, 2002.