System configuration check against security policies in industrial networks | IEEE Conference Publication | IEEE Xplore