Deploying agents in the network to detect intrusions | IEEE Conference Publication | IEEE Xplore