Methodology for Detecting Traces of Preparation for Cyber Attacks | IEEE Conference Publication | IEEE Xplore