An Approach to Detect and Classify Potentially Suspicious Activity from Real-Time Log Data using Anomaly Detection Methods | IEEE Conference Publication | IEEE Xplore