Implementing the intrusion detection exchange protocol | IEEE Conference Publication | IEEE Xplore