Simulation-based optimization of information security controls: An adversary-centric approach | Publicación