Anatomy of an Intrusion | IEEE Journals & Magazine | IEEE Xplore