Skip to main content

and
  1. No Access

    Article

    Malicious Events Grou** via Behavior Based Darknet Traffic Flow Analysis

    This paper proposes a host behavior based darknet traffic decomposition approach to identifying groups of malicious events from massive historical darknet traffic. In this approach, we segment traffic flows fr...

    Shaoning Pang, Dan Komosny, Lei Zhu, Ruibin Zhang in Wireless Personal Communications (2017)

  2. No Access

    Chapter and Conference Paper

    Behavior Based Darknet Traffic Decomposition for Malicious Events Identification

    This paper proposes a host (corresponding to a source IP) behavior based traffic decomposition approach to identify groups of malicious events from massive historical darknet traffic. In our approach, we segme...

    Ruibin Zhang, Lei Zhu, **aosong Li, Shaoning Pang in Neural Information Processing (2015)

  3. No Access

    Article

    Comprehensive Performance Analysis of Lightweight Mesh and Its Comparison with ZigBee Pro Technology

    As there is a rising demand on energy efficiency the proper network stack is an essential for every wireless sensor network application. This paper gives a comprehensive view on performance comparison of ...

    Vladimir Cervenka, Lubomir Mraz, Dan Komosny in Wireless Personal Communications (2014)

  4. No Access

    Article

    Comprehensive Performance Analysis of ZigBee Technology Based on Real Measurements

    Although the ZigBee technology is massively deployed the performance question still remains unanswered. There is a lack of serious performance evaluations and thus this paper provides a comprehensive and unbia...

    Lubomir Mraz, Vladimir Cervenka, Dan Komosny in Wireless Personal Communications (2013)

  5. No Access

    Article

    Investigation of radio channel uncertainty in distance estimation in wireless sensor networks

    The distance estimation between nodes is a crucial requirement for localization and object tracking. Received signal strength (RSS) measurement is one of the used methods for the distance estimation in wireles...

    Patrik Moravek, Dan Komosny, Milan Simek, Mojmir Jelinek in Telecommunication Systems (2013)

  6. No Access

    Chapter and Conference Paper

    Energy Efficient Public Key Cryptography in Wireless Sensor Networks

    As Wireless Sensor Networks are getting to be more applied in commercial solutions (e.g. Smart Grid and Energy Saving Outdoor Lighting) the more important issue, is to provide proper security. This paper gives...

    Vladimir Cervenka, Dan Komosny, Lukas Malina in Innovations and Advances in Computer, Info… (2013)

  7. No Access

    Chapter and Conference Paper

    Efficient Self-Localization and Data Gathering Architecture for Wireless Sensor Networks

    Plenty of proposed architectures for effective data gathering in WSN rely on the smart location awareness sensors andoptimize justthedata gathering processes. However, application of the several protocols to c...

    Milan Simek, Dan Komosny, Radim Burget in Novel Algorithms and Techniques in Telecom… (2010)

  8. Chapter and Conference Paper

    Multicast Feedback Control Protocol for Hierarchical Aggregation in Fixed and Mobile Networks

    For large-scale multimedia distributions, multicast is the preferred method of communication. ASM (Any Source Multicast) and SSM (Source-Specific Multicast) are the two types of multicast used. ASM is designed...

    Dan Komosny, Radim Burget in Personal Wireless Communications (2007)

  9. Chapter and Conference Paper

    Simulation of Large-Scale IPTV Systems for Fixed and Mobile Networks

    The Internet Protocol Television has received much attention in recent years. It is a service that delivers media contents to costumers using the Real-time Transport Protocol and RTP Control Protocol. It bring...

    Radim Bürget, Dan Komosny, Milan Simek in Personal Wireless Communications (2007)

  10. Chapter and Conference Paper

    Experiences of Any Source and Source Specific Multicast Implementation in Experimental Network

    Any Source Multicast (ASM) called Internet Standard Multicast (ISM) and its extension, Specific Source Multicast (SSM), are two known multicast technologies for delivering a data flow to a great number of cust...

    Milan Simek, Radim Bürget, Dan Komosny in Personal Wireless Communications (2007)

  11. No Access

    Chapter and Conference Paper

    H.323 Client-Independent Security Approach

    The security of videoconferencing or telephony data transmissions is a very important problem. There are several approaches how to protect communication in general. Videoconferencing or telephony over IP netwo...

    Lubomir Cvrk, Vaclav Zeman, Dan Komosny in Networking - ICN 2005 (2005)