Modeling Stepping Stone Attacks with Constraints in Cyber Infrastructure | IEEE Conference Publication | IEEE Xplore