Dependence of optimal monitoring strategy on the application to be protected | IEEE Conference Publication | IEEE Xplore