Generation and assessment of correlation rules to detect complex attack scenarios | IEEE Conference Publication | IEEE Xplore