Study on the Application of Graph Theory Algorithms and Attack Graphs in Cybersecurity Assessment | IEEE Conference Publication | IEEE Xplore