Automated Risk Assessment for Sources and Targets of Vulnerability Exploitation | IEEE Conference Publication | IEEE Xplore