UAG: User Action Graph Based on System Logs for Insider Threat Detection | IEEE Conference Publication | IEEE Xplore