Using Attack Graphs to Design Systems | IEEE Journals & Magazine | IEEE Xplore