Analysis of sequential exchanges between vulnerable forces: Searching Inside