Robert Bešťák

ORCID: 0000-0003-3757-3921
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Wireless Network Optimization
  • Advanced MIMO Systems Optimization
  • Cooperative Communication and Network Coding
  • Wireless Communication Networks Research
  • IPv6, Mobility, Handover, Networks, Security
  • Network Traffic and Congestion Control
  • Advanced Wireless Communication Techniques
  • IoT and Edge/Fog Computing
  • Wireless Networks and Protocols
  • Human Mobility and Location-Based Analysis
  • Opportunistic and Delay-Tolerant Networks
  • Software-Defined Networks and 5G
  • Mobile Ad Hoc Networks
  • Multimedia Communication and Technology
  • Caching and Content Delivery
  • Telecommunications and Broadcasting Technologies
  • Millimeter-Wave Propagation and Modeling
  • Network Security and Intrusion Detection
  • IoT Networks and Protocols
  • Complex Network Analysis Techniques
  • Mobile Agent-Based Network Management
  • Wireless Body Area Networks
  • Big Data and Business Intelligence
  • Augmented Reality Applications
  • Full-Duplex Wireless Communications

Czech Technical University in Prague
2015-2024

Geospatial Research (United Kingdom)
2021-2023

University of Defence
2023

Slovak University of Technology in Bratislava
2021

St. Francis Xavier University
2021

Texas Southern University
2021

Tribhuvan University
2021

Institute of Engineering
2021

National Institute of Technology Karnataka
2021

Deakin University
2021

The imminent threat that phishing websites poses is a major concern for internet users worldwide. These fraudulent are crafted by cyber attackers to appear trustworthy and deceive vulnerable into divulging confidential data like medical health records, credit card details, passwords, Personal Identifiable information (PII). To bait their victims, cybercriminals employ tactics such as social engineering, spear-phishing attacks, email scams. As result, unsuspecting individuals may be enticed...

10.1016/j.csa.2024.100036 article EN cc-by Cyber Security and Applications 2024-01-01

Wireless systems have the capability to address broad geographic area without costly infrastructure deployment. However, main drawback resides in bandwidth limitation and coverage for single access point. The deployment of Femtocell as promising wireless technology becomes one possible solution. In this paper handover procedure femtocell network is studied. 3GPP LTE based analysed three scenarios: hand-in, hand-out inter-FAP. addition, reactive proactive strategy also proposed decision...

10.1109/wmnc.2010.5678766 article EN 2010-10-01

The dynamic and evolving nature of mobile networks necessitates a proactive approach to security, one that goes beyond traditional methods embraces innovative strategies such as anomaly detection prediction. This study delves into the realm network security reliability enhancement through lens prediction, leveraging K-means clustering on call detail records (CDRs). By analyzing CDRs, which encapsulate comprehensive information about activities, messaging, data usage, this research aimed...

10.3390/s24061716 article EN cc-by Sensors 2024-03-07

The internet connectivity extended by the of things to all tangible lying around and used us in our day today life has convert devices into smart objects led huge set data generation that holds both valuable invaluable information. In order perfectly handle information’s generated mine valuables from them, analytics are engaged cloud. To have a timely access, most probably fog services preferred than cloud as they bring down service user edge reduces time complexity accessing So paper...

10.36548/jtcsst.2019.2.001 article EN Journal of Trends in Computer Science and Smart Technology 2019-12-03

10.1007/s11235-008-9093-1 article EN Telecommunication Systems 2008-03-14

In recent time, new advanced wireless systems emerged at the world markets. One of most promising is undoubtedly IEEE 802.16 standard, also known as WiMAX. For both, service providers and potential customers, necessary to know its basic capabilities, such number supported subscriber per BS or transferred data rate that may be delivered. This paper aimed 802.16-2004 standard intend fixed broadband access.

10.1109/icn.2007.107 article EN 2007-04-01

This paper investigates influence of femtocells to the traditional mobile network hierarchy and their features. upcoming technology is supposed be widely deployed in wireless networks. These small base stations are designed improve indoors capacity, reducing macro cell traffic or provide services locations without signal with weak coverage. The discusses usage femtocell related challenges, such as interferences, frequency spectrum planning, handovers integration into

10.1109/iwssip.2009.5367772 article EN 2009-06-01

The advancements in the technologies related to wireless communication systems has made vehicular adhoc networks prominent area of research automobile industry. absolute volume road traffic affects safety, convenience and efficiency flow urban areas. So paper scopes developing an intelligent control device model using network ameliorate flow. proposed system enhances travel by gathering information vehicles along with density movement on road. is modelled MATLAB examined over peak hours as...

10.36548/jitdw.2019.2.002 article EN Journal of Information Technology and Digital World 2019-12-08

Electronic healthcare technology is pervasive throughout the globe, and it affords vast opportunities to enhance clinical outcomes, as well for transformation of models care. Concerns are, however, growing, related data device security. Increased connectivity legacy computer networks brought cybersecurity vulnerabilities medical devices. Healthcare represents an attractive target cybercrime because precious. This sector in present times full unique challenges, especially susceptible kinds...

10.54536/ajise.v3i3.3576 article EN cc-by American Journal of Innovation in Science and Engineering 2024-10-31

IP multimedia subsystem (IMS) is standardized network architecture for telecom operators that want to provide mobile and fixed services. IMS-enabled networks access these services from both circuit-switched PSTN/PLMNs. This paper describes the IMS explains its benefits. It concentrates on main system components briefly summarizes their key functions. However, a rapidly evolving standard modifications are envisaged. provides base future research work in this domain

10.1109/elmar.2006.329576 article EN Proceedings Elmar ... 2006-06-01

The concept of Device-to-Device (D2D) communication has been introduced for local area connectivity as a means to improve the cellular spectrum utilization and reduce energy consumption user equipments. performance D2D is practically limited due large distance and/or poor channel conditions between transmitter receiver. To overcome these issues, relay-assisted where device relaying an additional transmission mode along with existing modes. In this paper, assignment algorithm based on...

10.1109/wmnc.2015.33 article EN 2015-10-01
Coming Soon ...