Studying Attacks to Information Systems Using Functional Networks | Publicación