Visualizing the insider threat: challenges and tools for identifying malicious user activity | IEEE Conference Publication | IEEE Xplore