Using model checking to analyze network vulnerabilities | IEEE Conference Publication | IEEE Xplore