Method for local positioning of the node violating information security in mobile networks intrusion detection systems | IEEE Conference Publication | IEEE Xplore