Two Stochastic Models for Security Evaluation Based on Attack Graph | IEEE Conference Publication | IEEE Xplore