Towards sequencing malicious system calls | IEEE Conference Publication | IEEE Xplore