Simulating Exploits for the Creation and Refinement of Detection Signatures | IEEE Conference Publication | IEEE Xplore