claim
Cyber intrusions can be routed through infected computers without the owners' permission, which decreases the verifiability of the attacker's origin.

Authors

Sources

Referenced by nodes (1)