Computer attack modeling and security evaluation based on attack graphs | IEEE Conference Publication | IEEE Xplore