Modeling cyber attacks on a critical infrastructure scenario | IEEE Conference Publication | IEEE Xplore