Using attack graphs and intrusion evidences to extrapolate network security state | IEEE Conference Publication | IEEE Xplore