Exploiting attack–defense trees to find an optimal set of countermeasures | IEEE Conference Publication | IEEE Xplore