Threat Hunting in System Using Log Analysis | IEEE Conference Publication | IEEE Xplore