Paper published at ITASEC'19, the Italian Conference on Cybersecurity (http://ceur-ws.org/Vol-2315/paper13.pdf)