Characterizing Transition Behaviors in Internet Attack Sequences | IEEE Conference Publication | IEEE Xplore