Δημοσιεύσεις

5G mobile communication systems Ad hoc networks Analysis and simulation; Communications networks; Greedy routing; Hyperbolic geometry; Network embedding; Scale-free properties; Shortest path routing; Traffic loads article; energy consumption; Markov random field; mobile application; prediction; resource allocation; simulation; workload Attack modeling; Probabilistic attack modeling; Topology control Attack strategies; Malware spreading Big data; Cluster analysis; Graph theory; Population dynamics; Sensor networks; Ubiquitous computing Big data; Environmental management; Machinery; Network layers; Network management Boolean functions; Code division multiple access; Computer networks; Game theory; Image coding; Throughput; Wireless telecommunication systems Cognitive radio Complex networks Computational costs; ILL-posed inverse problem; Incremental optimization; Link load measurement; Minimization problems; Traffic Engineering; Traffic matrix estimation; Traffic measurements Constrained recommendations; Information diffusion process; Information overloads; Joint behavior; Online social networks (OSN); Two-step procedure; User constraints; Users' -constraints Design development; Design evaluation; Key performance indicators; Mobile applications; Network infrastructure; Network requirements; Network slicing; Transport vertical; Validation trial; Vehicular service Industry 4.0 Information management Information systems Layered architecture; Logistics company; Logistics platforms; Optimisations; Platform architecture; Platform functionalities; Routings; Scheduling and routing; Systems architecture; Transportation operations Malware Natural resources management; Resource allocation; Telecommunication networks; Wireless telecommunication systems Network management Network routing Process control Resource allocation Social networking (online) Software radio Telecommunication networks Wireless ad hoc networks Wireless networks

Show all

2015

Karyotis, V.; Papavassiliou, S.

Macroscopic malware propagation dynamics for complex networks with churn Journal Article

In: IEEE Communications Letters, vol. 19, no. 4, pp. 577-580, 2015, ISSN: 10897798, (cited By 22).

Abstract | Links | BibTeX | Tags: Complex networks, Computer crime; Malware; Queueing networks; Time varying networks, Developed model; Dynamic nodes; Limited energies; Malware attacks; Malware propagation; Network reliability; Network robustness; Product forms