The method of detecting malware-infected hosts analyzing firewall and proxy logs | IEEE Conference Publication | IEEE Xplore