Optimizing the decision to expel attackers from an information system | IEEE Conference Publication | IEEE Xplore