Profiling file repository access patterns for identifying data exfiltration activities | IEEE Conference Publication | IEEE Xplore