Applying Military Tactics To Multi-Agent Intrusion Detection In Wireless Ad Hoc Networks