System Configuration Contributions to Vulnerability: Applications to Connected Personal Devices | IEEE Journals & Magazine | IEEE Xplore