521497.fig.004a
(a)
521497.fig.004b
(b)
521497.fig.004c
(c)
521497.fig.004d
(d)
Figure 4: Intrusion detection rate (a), false positives rate (b), memory usage (c), and traffic (d) depending on the network density.