Evaluation studies of three intrusion detection systems under various attacks and rule sets | IEEE Conference Publication | IEEE Xplore