An empirical study of filesystem activity following a SSH compromise | IEEE Conference Publication | IEEE Xplore