https://1library.org/document/zlggrlly-combining-using-decision-order-detect-intrusion-computer-networks.html