Detecting a malicious insider in the cloud environment using sequential rule mining | IEEE Conference Publication | IEEE Xplore