Verifying attack graphs through simulation | IEEE Conference Publication | IEEE Xplore