Strategies to Describe and Timely Detect Attacks | IEEE Conference Publication | IEEE Xplore