Mapping evidence graphs to attack graphs | IEEE Conference Publication | IEEE Xplore