Best Computer System Attack Strategy Finding Method | IEEE Conference Publication | IEEE Xplore