-
Article
Malicious Events Grou** via Behavior Based Darknet Traffic Flow Analysis
This paper proposes a host behavior based darknet traffic decomposition approach to identifying groups of malicious events from massive historical darknet traffic. In this approach, we segment traffic flows fr...
-
Article
Comprehensive Performance Analysis of Lightweight Mesh and Its Comparison with ZigBee Pro Technology
As there is a rising demand on energy efficiency the proper network stack is an essential for every wireless sensor network application. This paper gives a comprehensive view on performance comparison of ...
-
Article
Comprehensive Performance Analysis of ZigBee Technology Based on Real Measurements
Although the ZigBee technology is massively deployed the performance question still remains unanswered. There is a lack of serious performance evaluations and thus this paper provides a comprehensive and unbia...
-
Article
Investigation of radio channel uncertainty in distance estimation in wireless sensor networks
The distance estimation between nodes is a crucial requirement for localization and object tracking. Received signal strength (RSS) measurement is one of the used methods for the distance estimation in wireles...
-
Chapter and Conference Paper
Efficient Self-Localization and Data Gathering Architecture for Wireless Sensor Networks
Plenty of proposed architectures for effective data gathering in WSN rely on the smart location awareness sensors andoptimize justthedata gathering processes. However, application of the several protocols to c...
-
Chapter and Conference Paper
Multicast Feedback Control Protocol for Hierarchical Aggregation in Fixed and Mobile Networks
For large-scale multimedia distributions, multicast is the preferred method of communication. ASM (Any Source Multicast) and SSM (Source-Specific Multicast) are the two types of multicast used. ASM is designed...
-
Chapter and Conference Paper
Simulation of Large-Scale IPTV Systems for Fixed and Mobile Networks
The Internet Protocol Television has received much attention in recent years. It is a service that delivers media contents to costumers using the Real-time Transport Protocol and RTP Control Protocol. It bring...
-
Chapter and Conference Paper
Experiences of Any Source and Source Specific Multicast Implementation in Experimental Network
Any Source Multicast (ASM) called Internet Standard Multicast (ISM) and its extension, Specific Source Multicast (SSM), are two known multicast technologies for delivering a data flow to a great number of cust...
-
Chapter and Conference Paper
H.323 Client-Independent Security Approach
The security of videoconferencing or telephony data transmissions is a very important problem. There are several approaches how to protect communication in general. Videoconferencing or telephony over IP netwo...