Host in Danger? Detecting Network Intrusions from Authentication Logs | IEEE Conference Publication | IEEE Xplore