Cyber Vulnerability Implantation Revisited | IEEE Conference Publication | IEEE Xplore