A discuss of computer security strategy models | IEEE Conference Publication | IEEE Xplore