Learning attack strategies through mining and correlation of security alarms | IEEE Conference Publication | IEEE Xplore