Predicting Exploitations of Information Systems Vulnerabilities Through Attackers’ Characteristics | IEEE Journals & Magazine | IEEE Xplore