Employing miniaturized computers for distributed vulnerability assessment | IEEE Conference Publication | IEEE Xplore