{"id":"https://openalex.org/W3021950469","doi":"https://doi.org/10.7551/978-0-262-31709-2-ch082","title":"Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks","display_name":"Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks","publication_year":2013,"publication_date":"2013-08-29","ids":{"openalex":"https://openalex.org/W3021950469","doi":"https://doi.org/10.7551/978-0-262-31709-2-ch082","mag":"3021950469"},"language":"en","primary_location":{"id":"doi:10.7551/978-0-262-31709-2-ch082","is_oa":true,"landing_page_url":"https://doi.org/10.7551/978-0-262-31709-2-ch082","pdf_url":"http://www.mitpressjournals.org/doi/pdf/10.1162/978-0-262-31709-2-ch082","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Artificial Life, ECAL 2013","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://www.mitpressjournals.org/doi/pdf/10.1162/978-0-262-31709-2-ch082","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075732092","display_name":"Martin Stehl\u00edk","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Martin Stehlik","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054219988","display_name":"Adam Saleh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Adam Saleh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031990354","display_name":"Andriy Stetsko","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Andriy Stetsko","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5089620979","display_name":"Vashek Maty\u00e1\u0161","orcid":"https://orcid.org/0000-0001-7957-7694"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vashek Matyas","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5075732092"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7251,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.76356307,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"569","last_page":"576"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10848","display_name":"Advanced Multi-Objective Optimization Algorithms","score":0.9261999726295471,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10848","display_name":"Advanced Multi-Objective Optimization Algorithms","score":0.9261999726295471,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11975","display_name":"Evolutionary Algorithms and Applications","score":0.9003999829292297,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7668132781982422},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7568417191505432},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7547116279602051},{"id":"https://openalex.org/keywords/evolutionary-algorithm","display_name":"Evolutionary algorithm","score":0.6965557336807251},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.5144562721252441},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.5083112120628357},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4776143729686737},{"id":"https://openalex.org/keywords/optimization-problem","display_name":"Optimization problem","score":0.4457722008228302},{"id":"https://openalex.org/keywords/evolutionary-computation","display_name":"Evolutionary computation","score":0.4417085349559784},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4116032123565674},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.40662747621536255},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.31330281496047974},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.25943446159362793},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.17075428366661072},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.06899306178092957}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7668132781982422},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7568417191505432},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7547116279602051},{"id":"https://openalex.org/C159149176","wikidata":"https://www.wikidata.org/wiki/Q14489129","display_name":"Evolutionary algorithm","level":2,"score":0.6965557336807251},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.5144562721252441},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5083112120628357},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4776143729686737},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.4457722008228302},{"id":"https://openalex.org/C105902424","wikidata":"https://www.wikidata.org/wiki/Q1197129","display_name":"Evolutionary computation","level":2,"score":0.4417085349559784},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4116032123565674},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40662747621536255},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31330281496047974},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25943446159362793},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.17075428366661072},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.06899306178092957},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.7551/978-0-262-31709-2-ch082","is_oa":true,"landing_page_url":"https://doi.org/10.7551/978-0-262-31709-2-ch082","pdf_url":"http://www.mitpressjournals.org/doi/pdf/10.1162/978-0-262-31709-2-ch082","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Artificial Life, ECAL 2013","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.7551/978-0-262-31709-2-ch082","is_oa":true,"landing_page_url":"https://doi.org/10.7551/978-0-262-31709-2-ch082","pdf_url":"http://www.mitpressjournals.org/doi/pdf/10.1162/978-0-262-31709-2-ch082","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Artificial Life, ECAL 2013","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3021950469.pdf","grobid_xml":"https://content.openalex.org/works/W3021950469.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2133389611","https://openalex.org/W4297582752","https://openalex.org/W4285805405","https://openalex.org/W85101999","https://openalex.org/W2391924736","https://openalex.org/W3133779647","https://openalex.org/W4291270682","https://openalex.org/W1560122427","https://openalex.org/W2593449396","https://openalex.org/W2780789525"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1,44,89],"is":[2],"an":[3,107],"essential":[4],"mechanism":[5],"to":[6,21,39,77],"protect":[7],"wireless":[8,56],"sensor":[9,57],"networks":[10],"against":[11],"internal":[12],"attacks":[13],"that":[14,34,50],"are":[15,51],"relatively":[16],"easy":[17],"and":[18,30,46,91,98,123],"not":[19],"expensive":[20],"mount":[22],"in":[23,55],"these":[24],"networks.":[25,58],"Recently,":[26],"we":[27,80],"proposed,":[28],"implemented":[29],"tested":[31],"a":[32,36,41,61],"framework":[33],"helps":[35],"network":[37],"operator":[38],"find":[40],"trade-off":[42],"between":[43],"accuracy":[45],"usage":[47],"of":[48,83,106,116,121,126],"resources":[49],"usually":[52],"highly":[53],"constrained":[54],"We":[59],"used":[60],"single-objective":[62],"optimization":[63],"evolutionary":[64,85,95,108],"algorithm":[65,109],"for":[66,87],"this":[67],"purpose.":[68],"This":[69],"approach,":[70],"however,":[71],"has":[72],"its":[73,111],"limitations.":[74],"In":[75],"order":[76],"eliminate":[78],"them,":[79],"show":[81],"benefits":[82],"multi-objective":[84,94],"algorithms":[86,96],"intrusion":[88],"parametrization":[90],"examine":[92],"two":[93],"(NSGA-II":[97],"SPEA2).":[99],"Our":[100],"examination":[101],"focuses":[102],"on":[103,113],"the":[104,114,119,124],"impact":[105],"(and":[110],"parameters)":[112],"optimality":[115],"found":[117],"solutions,":[118],"speed":[120],"convergence":[122],"number":[125],"evaluations.":[127]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
