The Last Mile of Attack Investigation: Audit Log Analysis Toward Software Vulnerability Location | IEEE Journals & Magazine | IEEE Xplore