"14330" . . . "4"^^ . "0302-9743" . . "Smolka, Tobi\u00E1\u0161" . . "2014-01-01+01:00"^^ . "Maty\u00E1\u0161, V\u00E1clav" . . . "Intrusion detection; optimization; wireless sensor networks"@en . "Springer-Verlag" . "9783319075358" . . . "RIV/00216224:14330/14:00073679!RIV15-MSM-14330___" . . "Heidelberg" . "Applied Cryptography and Network Security" . "Improving Intrusion Detection Systems for Wireless Sensor Networks" . "P(GAP202/11/0422), S" . . "[8284381121CA]" . . "Improving Intrusion Detection Systems for Wireless Sensor Networks" . . "A considerable amount of research has been undertaken in the field of intrusion detection in wireless sensor networks. Researchers proposed a number of relevant mechanisms, and it is not an easy task to select the right ones for a given application scenario. Even when a network operator knows what mechanism to use, it remains an open issue how to configure this particular mechanism in such a way that it is efficient for the particular needs. We propose a framework that optimizes the configuration of an intrusion detection system in terms of detection accuracy and memory usage. There is a variety of scenarios, and a single set of configuration values is not optimal for all of them. Therefore, we believe, such a framework is of a great value for a network operator who needs to optimize an intrusion detection system for his particular needs, e.g., attacker model, environment, node parameters." . . "Improving Intrusion Detection Systems for Wireless Sensor Networks"@en . "Improving Intrusion Detection Systems for Wireless Sensor Networks"@en . . "A considerable amount of research has been undertaken in the field of intrusion detection in wireless sensor networks. Researchers proposed a number of relevant mechanisms, and it is not an easy task to select the right ones for a given application scenario. Even when a network operator knows what mechanism to use, it remains an open issue how to configure this particular mechanism in such a way that it is efficient for the particular needs. We propose a framework that optimizes the configuration of an intrusion detection system in terms of detection accuracy and memory usage. There is a variety of scenarios, and a single set of configuration values is not optimal for all of them. Therefore, we believe, such a framework is of a great value for a network operator who needs to optimize an intrusion detection system for his particular needs, e.g., attacker model, environment, node parameters."@en . "21004" . . . "18"^^ . "Stetsko, Andriy" . . "http://link.springer.com/chapter/10.1007%2F978-3-319-07536-5_21" . . "Lausanne, Switzerland" . "RIV/00216224:14330/14:00073679" . "Stehl\u00EDk, Martin" . . "10.1007/978-3-319-07536-5_21" . "4"^^ . .