Analysis of Attacker Behavior in Compromised Hosts During Command and Control | IEEE Conference Publication | IEEE Xplore