-
Article
Malicious Events Grou** via Behavior Based Darknet Traffic Flow Analysis
This paper proposes a host behavior based darknet traffic decomposition approach to identifying groups of malicious events from massive historical darknet traffic. In this approach, we segment traffic flows fr...
-
Article
Comprehensive Performance Analysis of Lightweight Mesh and Its Comparison with ZigBee Pro Technology
As there is a rising demand on energy efficiency the proper network stack is an essential for every wireless sensor network application. This paper gives a comprehensive view on performance comparison of ...
-
Article
Comprehensive Performance Analysis of ZigBee Technology Based on Real Measurements
Although the ZigBee technology is massively deployed the performance question still remains unanswered. There is a lack of serious performance evaluations and thus this paper provides a comprehensive and unbia...
-
Chapter and Conference Paper
Energy Efficient Public Key Cryptography in Wireless Sensor Networks
As Wireless Sensor Networks are getting to be more applied in commercial solutions (e.g. Smart Grid and Energy Saving Outdoor Lighting) the more important issue, is to provide proper security. This paper gives...
-
Chapter and Conference Paper
Efficient Self-Localization and Data Gathering Architecture for Wireless Sensor Networks
Plenty of proposed architectures for effective data gathering in WSN rely on the smart location awareness sensors andoptimize justthedata gathering processes. However, application of the several protocols to c...
-
Chapter and Conference Paper
Multicast Feedback Control Protocol for Hierarchical Aggregation in Fixed and Mobile Networks
For large-scale multimedia distributions, multicast is the preferred method of communication. ASM (Any Source Multicast) and SSM (Source-Specific Multicast) are the two types of multicast used. ASM is designed...
-
Chapter and Conference Paper
Simulation of Large-Scale IPTV Systems for Fixed and Mobile Networks
The Internet Protocol Television has received much attention in recent years. It is a service that delivers media contents to costumers using the Real-time Transport Protocol and RTP Control Protocol. It bring...
-
Chapter and Conference Paper
Experiences of Any Source and Source Specific Multicast Implementation in Experimental Network
Any Source Multicast (ASM) called Internet Standard Multicast (ISM) and its extension, Specific Source Multicast (SSM), are two known multicast technologies for delivering a data flow to a great number of cust...