Exchanging security events: Which and how many alerts can we aggregate? | IEEE Conference Publication | IEEE Xplore