Return to Article Details Common Vulnerabilities of Electronic Perimeter Protection Systems and Possible Methods of Their Defense Download Download PDF