Analysis and visualization of SSH attacks using honeypots | IEEE Conference Publication | IEEE Xplore