Exploring the prudent limits of automated cyber attack | IEEE Conference Publication | IEEE Xplore