Ranking Attacks Based on Vulnerability Analysis | IEEE Conference Publication | IEEE Xplore