Researchers devise new way to evaluate cybersecurity methods