Visualizing and identifying intrusion context from system calls trace | IEEE Conference Publication | IEEE Xplore