Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts | IEEE Conference Publication | IEEE Xplore