A divide-and-conquer approach to distributed attack identification | IEEE Conference Publication | IEEE Xplore