Identifying Security Threats in the System Using Automated Security Logs | IEEE Conference Publication | IEEE Xplore