Δημοσιεύσεις

5G mobile communication systems Ad hoc networks Adaptive systems; Industry; Knowledge management; Societies and institutions Analysis and simulation; Communications networks; Greedy routing; Hyperbolic geometry; Network embedding; Scale-free properties; Shortest path routing; Traffic loads Attack strategies; Malware spreading Back pressures; Backpressure optimization; Freight companies; Intelligent method; Logistics enterprise; Logistics network; Optimisations; Routings; Scheduling; System framework Benchmarking; Life cycle Boolean functions; Code division multiple access; Computer networks; Game theory; Image coding; Throughput; Wireless telecommunication systems Cognitive radio Complex networks Complex networks; Computational efficiency; Distributed computer systems; Traffic congestion Continuum mechanics; Topology Distributed networks; Energy depletion; Internet access; Network behaviors; Network reliability; Network robustness; Queuing network; Wireless multi-hop network Energy efficiency Energy-constrained mobile threats; Wireless ad hoc network Gibbs sampling; Malware propagation; Markov Random Fields; Network robustness; Network science Heuristic methods; Social networking (online) Industrial equipment; Industrial networks; Industrial robotics; Network infrastructure; Next generation Internet; Remote driving Information management Information use Malware Network routing Resource allocation Semantic Web Social networking (online) Software radio Telecommunication networks Wireless ad hoc networks Wireless networks

Show all

2016

Karyotis, V.; Khouzani, M. H. R.

Malware Diffusion Models for Modern Complex Networks: Theory and Applications Book

Elsevier Inc., 2016, ISBN: 9780128027141, (cited By 34).

Abstract | Links | BibTeX | Tags: Application models; Calculus of variations; Communications networks; Diffusion process; General applications; Global economies; State of the art; Theoretical aspects, Application programs; Calculations; Complex networks; Computer crime; Computer games; Diffusion; Game theory; Information dissemination, Malware