Information Security Automation: How Far Can We Go? | IEEE Conference Publication | IEEE Xplore