Δημοσιεύσεις

5G mobile communication systems Ad hoc networks Ad hoc networks; Internet; Mobile ad hoc networks; Multimedia systems; Network security; Stochastic systems; Telecommunication networks article; energy consumption; Markov random field; mobile application; prediction; resource allocation; simulation; workload Big data; Cluster analysis; Graph theory; Population dynamics; Sensor networks; Ubiquitous computing Big data; Environmental management; Machinery; Network layers; Network management Channel assignment and routing; Channel switching; Cognitive radio network; MILP; Reconfiguration Cognitive radio Cognitive radio network; Cross layer optimization; Distributed computations; Gibbs sampling; Markov Random Fields; Spectrum sharing Complex networks Computational costs; ILL-posed inverse problem; Incremental optimization; Link load measurement; Minimization problems; Traffic Engineering; Traffic matrix estimation; Traffic measurements Computer software; Mathematical models; Parameter estimation; Queueing networks Constrained recommendations; Information diffusion process; Information overloads; Joint behavior; Online social networks (OSN); Two-step procedure; User constraints; Users' -constraints Cover time; Energy consumption; Hybrid random walks; Multihop networks; Topology awareness Current practices; Diverse applications; Effective solution; Network economics; Network resource allocations; Network topology; Resource management; Routing Design development; Design evaluation; Key performance indicators; Mobile applications; Network infrastructure; Network requirements; Network slicing; Transport vertical; Validation trial; Vehicular service Industry 4.0 Information management Information systems Infrastructure networks; Mobile social networks; Mobile telecommunications; On-line social networks; Personalized advertisings; Resource management; Utility-based framework; Wireless communications Layered architecture; Logistics company; Logistics platforms; Optimisations; Platform architecture; Platform functionalities; Routings; Scheduling and routing; Systems architecture; Transportation operations Malware Maxwell equations; Random processes; Random variables; Simulators; Stochastic models; Stochastic systems; Traveling wave antennas Network routing Resource allocation Social networking (online) Software radio Wireless ad hoc networks Wireless networks

Show all

2019

Karyotis, V.

A Markov Random Field Framework for Modeling Malware Propagation in Complex Communications Networks Journal Article

In: IEEE Transactions on Dependable and Secure Computing, vol. 16, no. 4, pp. 551-564, 2019, ISSN: 15455971, (cited By 10).

Abstract | Links | BibTeX | Tags: Complex networks; Image segmentation; Magnetorheological fluids; Markov processes; Simulated annealing; Stochastic systems; Structural frames, Gibbs sampling; Malware propagation; Markov Random Fields; Network robustness; Network science, Malware

2016

Karyotis, V.; Khouzani, M. H. R.

Malware Diffusion Models for Modern Complex Networks: Theory and Applications Book

Elsevier Inc., 2016, ISBN: 9780128027141, (cited By 34).

Abstract | Links | BibTeX | Tags: Application models; Calculus of variations; Communications networks; Diffusion process; General applications; Global economies; State of the art; Theoretical aspects, Application programs; Calculations; Complex networks; Computer crime; Computer games; Diffusion; Game theory; Information dissemination, Malware

2014

Karyotis, V.; Papavassiliou, S.

Evaluation of malware spreading in wireless multihop networks with churn Journal Article

In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 140, pp. 63-74, 2014, ISSN: 18678211, (cited By 3; Conference of 6th International ICST Conference on Ad Hoc Networks, ADHOCNETS 2014 ; Conference Date: 18 August 2014 Through 19 August 2014; Conference Code:111559).

Abstract | Links | BibTeX | Tags: Computer crime; Wireless ad hoc networks, Distributed networks; Energy depletion; Internet access; Network behaviors; Network reliability; Network robustness; Queuing network; Wireless multi-hop network, Malware