Fig. 2From: Intrusion detection systems for wireless sensor networks using computational intelligence techniquesOperating a better IDS systemBack to article page