Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks | IEEE Conference Publication | IEEE Xplore