Profiling Attacker Behavior Following SSH Compromises | IEEE Conference Publication | IEEE Xplore