Identifying individual vulnerability based on public data | IEEE Conference Publication | IEEE Xplore