Sequential modeling for obfuscated network attack action sequences | IEEE Conference Publication | IEEE Xplore