Information fusion in computer security