Mining malware command and control traces | IEEE Conference Publication | IEEE Xplore