Continuous assessment of a Unix configuration: integrating intrusion detection and configuration analysis | IEEE Conference Publication | IEEE Xplore