Return to Article Details Persistence and vulnerability Download Download PDF