Towards the attack signatures' comparison in survivable computer networks | IEEE Conference Publication | IEEE Xplore