An empirical model of the security intrusion process | IEEE Conference Publication | IEEE Xplore