Provenance-aware security risk analysis for hosts and network flows | IEEE Conference Publication | IEEE Xplore