Foiling the wiley hacker: more than analysis and containment | IEEE Conference Publication | IEEE Xplore