Using Feature Selection to Identify Chains of Insecure Software Configuration Parameters | IEEE Conference Publication | IEEE Xplore