An analysis of signature overlaps in Intrusion Detection Systems | IEEE Conference Publication | IEEE Xplore