Attack of the legacy systems - [Back Story] | IEEE Journals & Magazine | IEEE Xplore