How to systematically classify computer security intrusions | IEEE Conference Publication | IEEE Xplore