Controlling the Resources of the Intrusion Detection System at Network Objects Monitoring | IEEE Conference Publication | IEEE Xplore