Analyzing Post-injection Attacker Activities in IoT Devices: A Comprehensive Log Analysis Approach | IEEE Conference Publication | IEEE Xplore