AClog: Attack Chain Construction Based on Log Correlation | IEEE Conference Publication | IEEE Xplore