Drawing inferences from cyber espionage | IEEE Conference Publication | IEEE Xplore