Remediating Logical Attack Paths Using Information System Simulated Topologies Conference Paper uri icon