Investigating intrusion detection systems that use trails of system calls | IEEE Conference Publication | IEEE Xplore