Return to Article Details Methodology for assessing threats to critical infrastructure objects during enemy fire Download Download PDF