Selecting appropriate counter-measures in an intrusion detection framework | IEEE Conference Publication | IEEE Xplore