Cyber-intrusion response | IEEE Conference Publication | IEEE Xplore