Constructing a Complete Timeline of a Security Incident by Aggregating Reports | IEEE Conference Publication | IEEE Xplore