Producing and evaluating crowdsourced computer security attack trees | IEEE Conference Publication | IEEE Xplore