Analysis of log files as a security aid | IEEE Conference Publication | IEEE Xplore