Using Cluster and Correlation to Construct Attack Scenarios | IEEE Conference Publication | IEEE Xplore