Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering | IEEE Conference Publication | IEEE Xplore