How to exchange security events? Overview and evaluation of formats and protocols | IEEE Conference Publication | IEEE Xplore