Detecting and mitigating security anomalies | IEEE Conference Publication | IEEE Xplore