Game Theory Based Optimization of Security Configuration | IEEE Conference Publication | IEEE Xplore