Skip to main content

and
  1. No Access

    Article

    Malicious Events Grou** via Behavior Based Darknet Traffic Flow Analysis

    This paper proposes a host behavior based darknet traffic decomposition approach to identifying groups of malicious events from massive historical darknet traffic. In this approach, we segment traffic flows fr...

    Shaoning Pang, Dan Komosny, Lei Zhu, Ruibin Zhang in Wireless Personal Communications (2017)

  2. No Access

    Article

    Comprehensive Performance Analysis of Lightweight Mesh and Its Comparison with ZigBee Pro Technology

    As there is a rising demand on energy efficiency the proper network stack is an essential for every wireless sensor network application. This paper gives a comprehensive view on performance comparison of ...

    Vladimir Cervenka, Lubomir Mraz, Dan Komosny in Wireless Personal Communications (2014)

  3. No Access

    Article

    Comprehensive Performance Analysis of ZigBee Technology Based on Real Measurements

    Although the ZigBee technology is massively deployed the performance question still remains unanswered. There is a lack of serious performance evaluations and thus this paper provides a comprehensive and unbia...

    Lubomir Mraz, Vladimir Cervenka, Dan Komosny in Wireless Personal Communications (2013)