Reasoning about complementary intrusion evidence | IEEE Conference Publication | IEEE Xplore