Verify results of network intrusion alerts using lightweight protocol analysis | IEEE Conference Publication | IEEE Xplore