Efficient generation of exploit dependency graph by customized attack modeling technique | IEEE Conference Publication | IEEE Xplore