Designing, optimizing, and evaluating network security configuration | IEEE Conference Publication | IEEE Xplore