User identification through command history analysis | IEEE Conference Publication | IEEE Xplore