Other formats:
BibTeX
LaTeX
RIS
@inproceedings{1185571, author = {Stetsko, Andriy and Smolka, Tobiáš and Matyáš, Václav and Stehlík, Martin}, address = {Heidelberg}, booktitle = {Applied Cryptography and Network Security}, doi = {http://dx.doi.org/10.1007/978-3-319-07536-5_21}, editor = {Ioana Boureanu, Philippe Owesarski, Serge Vaudenay}, keywords = {Intrusion detection; optimization; wireless sensor networks}, howpublished = {paměťový nosič}, language = {eng}, location = {Heidelberg}, isbn = {978-3-319-07535-8}, pages = {343-360}, publisher = {Springer}, title = {Improving Intrusion Detection Systems for Wireless Sensor Networks}, url = {http://link.springer.com/chapter/10.1007%2F978-3-319-07536-5_21}, year = {2014} }
TY - JOUR ID - 1185571 AU - Stetsko, Andriy - Smolka, Tobiáš - Matyáš, Václav - Stehlík, Martin PY - 2014 TI - Improving Intrusion Detection Systems for Wireless Sensor Networks PB - Springer CY - Heidelberg SN - 9783319075358 KW - Intrusion detection KW - optimization KW - wireless sensor networks UR - http://link.springer.com/chapter/10.1007%2F978-3-319-07536-5_21 L2 - http://link.springer.com/chapter/10.1007%2F978-3-319-07536-5_21 N2 - A considerable amount of research has been undertaken in the field of intrusion detection in wireless sensor networks. Researchers proposed a number of relevant mechanisms, and it is not an easy task to select the right ones for a given application scenario. Even when a network operator knows what mechanism to use, it remains an open issue how to configure this particular mechanism in such a way that it is efficient for the particular needs. We propose a framework that optimizes the configuration of an intrusion detection system in terms of detection accuracy and memory usage. There is a variety of scenarios, and a single set of configuration values is not optimal for all of them. Therefore, we believe, such a framework is of a great value for a network operator who needs to optimize an intrusion detection system for his particular needs, e.g., attacker model, environment, node parameters. ER -
STETSKO, Andriy, Tobiáš SMOLKA, Václav MATYÁŠ and Martin STEHLÍK. Improving Intrusion Detection Systems for Wireless Sensor Networks. In Ioana Boureanu, Philippe Owesarski, Serge Vaudenay. \textit{Applied Cryptography and Network Security}. Heidelberg: Springer, 2014, p.~343-360. ISBN~978-3-319-07535-8. Available from: https://dx.doi.org/10.1007/978-3-319-07536-5\_{}21.
|