Distributed Intrusion Detection: Simulation and Evaluation of Two Methodologies | IEEE Conference Publication | IEEE Xplore