Trustworthy Intrusion Detection in E-Healthcare Systems