Protocol analysis in intrusion detection using decision tree | IEEE Conference Publication | IEEE Xplore