Detecting Advanced Attacks Based On Linux Logs | IEEE Conference Publication | IEEE Xplore