In order to evaluate user's vulnerabilities profile | IEEE Conference Publication | IEEE Xplore