An effective method to generate attack graph | IEEE Conference Publication | IEEE Xplore