Δημοσιεύσεις

5G mobile communication systems Ad hoc and sensor networks; Closed queuing networks; Idle energy; MAC layer; Malicious software; Malware spreading; Malwares; Network density; Node degree; Probabilistic framework; Sleeping schedule; Time-dependent; Topology control; Topology control attacks; Wireless nodes Ad hoc networks Ad hoc networks; Dynamics; Mobile ad hoc networks; Network layers; Resource allocation; Topology; Wireless networks Age of information; Delay-Tolerant Network; Delay-tolerant routing; Delivery time; Distributed routing protocols; In networks; Packet Delivery; Packet delivery time; Round-trip-time; Routing-protocol Backpressure scheduling; Backpressure scheduling-routing; Distributed energies; Distributed networks; Energy; Energy-transfer; Power exchange; Routings; Wireless data; Wireless energy transfers Behavioral research; Game theory; Health; Social networking (online) Clustering algorithms Code division multiple access; Game theory; Mobile telecommunication systems; Wireless telecommunication systems Cognitive radio Cognitive radio; Heuristic methods; Integer programming; Optimization; Radio systems Community detection; Complex data; Database approaches; Diverse fields; Hyperbolic networks; Large datasets; New approaches; Resource description framework Complex networks Content distribution; Evolutionary modification; Small World Phenomenon; Topology control; Trust management; Wireless multihop networks Coverage constraints; Extensive simulations; Influence networks; Information diffusion; Integer programming problems; Online social networks (OSN); Set cover problem; Weighted set covers E-learning Emerging technologies; Energy allocations; Energy sharings; Energy-balancing; Fairness; In networks; Resource exchange; Reverse wireless charging; Wireless charging; Wireless power Information management Internet; Topology; Vector spaces Key performance indicators; Mobile communications; Network requirements; Network slicing; Quality-of-service; Requirement analysis; Service experience; Software-defined networkings; Software-defined networks; Transport vertical Malware Network evolution; Network science; Online social networks; Topology control; Wireless multi-hop network Network routing Network security Resource allocation Social networking (online) Software radio Wireless ad hoc networks Wireless networks

Show all

2019

Karyotis, V.

A Markov Random Field Framework for Modeling Malware Propagation in Complex Communications Networks Journal Article

In: IEEE Transactions on Dependable and Secure Computing, vol. 16, no. 4, pp. 551-564, 2019, ISSN: 15455971, (cited By 10).

Abstract | Links | BibTeX | Tags: Complex networks; Image segmentation; Magnetorheological fluids; Markov processes; Simulated annealing; Stochastic systems; Structural frames, Gibbs sampling; Malware propagation; Markov Random Fields; Network robustness; Network science, Malware

2016

Karyotis, V.; Khouzani, M. H. R.

Malware Diffusion Models for Modern Complex Networks: Theory and Applications Book

Elsevier Inc., 2016, ISBN: 9780128027141, (cited By 34).

Abstract | Links | BibTeX | Tags: Application models; Calculus of variations; Communications networks; Diffusion process; General applications; Global economies; State of the art; Theoretical aspects, Application programs; Calculations; Complex networks; Computer crime; Computer games; Diffusion; Game theory; Information dissemination, Malware

2014

Karyotis, V.; Papavassiliou, S.

Evaluation of malware spreading in wireless multihop networks with churn Journal Article

In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 140, pp. 63-74, 2014, ISSN: 18678211, (cited By 3; Conference of 6th International ICST Conference on Ad Hoc Networks, ADHOCNETS 2014 ; Conference Date: 18 August 2014 Through 19 August 2014; Conference Code:111559).

Abstract | Links | BibTeX | Tags: Computer crime; Wireless ad hoc networks, Distributed networks; Energy depletion; Internet access; Network behaviors; Network reliability; Network robustness; Queuing network; Wireless multi-hop network, Malware