This HTML5 document contains 49 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n6http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n12http://purl.org/net/nknouf/ns/bibtex#
n3http://localhost/temp/predkladatel/
n18http://linked.opendata.cz/resource/domain/vavai/projekt/
n9http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n14http://linked.opendata.cz/ontology/domain/vavai/
n13https://schema.org/
shttp://schema.org/
n5http://linked.opendata.cz/ontology/domain/vavai/riv/
rdfshttp://www.w3.org/2000/01/rdf-schema#
skoshttp://www.w3.org/2004/02/skos/core#
n23http://bibframe.org/vocab/
n19http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216224%3A14330%2F14%3A00073679%21RIV15-MSM-14330___/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n8http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n17http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n22http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n20http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n16http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n10http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n11http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216224%3A14330%2F14%3A00073679%21RIV15-MSM-14330___
rdf:type
skos:Concept n14:Vysledek
rdfs:seeAlso
http://link.springer.com/chapter/10.1007%2F978-3-319-07536-5_21
dcterms:description
A considerable amount of research has been undertaken in the field of intrusion detection in wireless sensor networks. Researchers proposed a number of relevant mechanisms, and it is not an easy task to select the right ones for a given application scenario. Even when a network operator knows what mechanism to use, it remains an open issue how to configure this particular mechanism in such a way that it is efficient for the particular needs. We propose a framework that optimizes the configuration of an intrusion detection system in terms of detection accuracy and memory usage. There is a variety of scenarios, and a single set of configuration values is not optimal for all of them. Therefore, we believe, such a framework is of a great value for a network operator who needs to optimize an intrusion detection system for his particular needs, e.g., attacker model, environment, node parameters. A considerable amount of research has been undertaken in the field of intrusion detection in wireless sensor networks. Researchers proposed a number of relevant mechanisms, and it is not an easy task to select the right ones for a given application scenario. Even when a network operator knows what mechanism to use, it remains an open issue how to configure this particular mechanism in such a way that it is efficient for the particular needs. We propose a framework that optimizes the configuration of an intrusion detection system in terms of detection accuracy and memory usage. There is a variety of scenarios, and a single set of configuration values is not optimal for all of them. Therefore, we believe, such a framework is of a great value for a network operator who needs to optimize an intrusion detection system for his particular needs, e.g., attacker model, environment, node parameters.
dcterms:title
Improving Intrusion Detection Systems for Wireless Sensor Networks Improving Intrusion Detection Systems for Wireless Sensor Networks
skos:prefLabel
Improving Intrusion Detection Systems for Wireless Sensor Networks Improving Intrusion Detection Systems for Wireless Sensor Networks
skos:notation
RIV/00216224:14330/14:00073679!RIV15-MSM-14330___
n5:aktivita
n20:S n20:P
n5:aktivity
P(GAP202/11/0422), S
n5:dodaniDat
n11:2015
n5:domaciTvurceVysledku
n9:8881162 n9:4292715 n9:5113814 n9:3636372
n5:druhVysledku
n10:D
n5:duvernostUdaju
n17:S
n5:entitaPredkladatele
n19:predkladatel
n5:idSjednocenehoVysledku
21004
n5:idVysledku
RIV/00216224:14330/14:00073679
n5:jazykVysledku
n22:eng
n5:klicovaSlova
Intrusion detection; optimization; wireless sensor networks
n5:klicoveSlovo
n8:Intrusion%20detection n8:wireless%20sensor%20networks n8:optimization
n5:kontrolniKodProRIV
[8284381121CA]
n5:mistoKonaniAkce
Lausanne, Switzerland
n5:mistoVydani
Heidelberg
n5:nazevZdroje
Applied Cryptography and Network Security
n5:obor
n16:IN
n5:pocetDomacichTvurcuVysledku
4
n5:pocetTvurcuVysledku
4
n5:projekt
n18:GAP202%2F11%2F0422
n5:rokUplatneniVysledku
n11:2014
n5:tvurceVysledku
Smolka, Tobiáš Matyáš, Václav Stetsko, Andriy Stehlík, Martin
n5:typAkce
n6:WRD
n5:zahajeniAkce
2014-01-01+01:00
s:issn
0302-9743
s:numberOfPages
18
n23:doi
10.1007/978-3-319-07536-5_21
n12:hasPublisher
Springer-Verlag
n13:isbn
9783319075358
n3:organizacniJednotka
14330