Whom to remove? Breaking the covert network | IEEE Conference Publication | IEEE Xplore