Hide/Show Apps

Finding sensing coverage and breach paths in surveillance wireless sensor networks