Using cyber defense exercises to obtain additional data for attacker profiling | IEEE Conference Publication | IEEE Xplore