A game theoretic model of computer network exploitation campaigns | IEEE Conference Publication | IEEE Xplore