Δημοσιεύσεις

5G mobile communication systems 5G mobile communication systems; Intelligent systems; Intelligent vehicle highway systems; Traffic control Accurate estimation; Efficient monitoring; Monitoring approach; Monitoring techniques; Network monitoring tools; Performance metrics; Software defined networking (SDN); Vehicular networks Ad hoc networks Ad hoc networks; Computer software; Network management; Risk analysis; Topology Application programs; Calculations; Complex networks; Computer crime; Computer games; Diffusion; Game theory; Information dissemination Aquaculture; Industry; Technology; Wireless Technology Back pressures; Backpressure scheduling; Freight management; Logistics system; Management systems; Optimal scheduling; Packet routing; Packet scheduling; Performances evaluation; Routing and scheduling Cognitive radio Cognitive radio; Image segmentation; Radio systems; Ubiquitous computing; Wireless telecommunication systems Cognitive systems; Computer simulation; Radio systems; Topology Complex networks Complex networks; Computational efficiency; Distributed computer systems; Traffic congestion Computer crime; Malware; Queueing networks; Time varying networks Decision making; Heterogeneous networks; Markov processes; Network layers; Resource allocation; Structural frames; Wireless networks Information management Infrastructure networks; Mobile social networks; Mobile telecommunications; On-line social networks; Personalized advertisings; Resource management; Utility-based framework; Wireless communications International symposium; Joint power and rate control Knowledge representation Malware Maxwell equations; Random processes; Random variables; Simulators; Stochastic models; Stochastic systems; Traveling wave antennas Network coding Network routing Resource allocation Semantic Web Social networking (online) Software radio Wireless ad hoc networks Wireless networks

Show all

2014

Karyotis, V.; Papavassiliou, S.

Evaluation of malware spreading in wireless multihop networks with churn Journal Article

In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 140, pp. 63-74, 2014, ISSN: 18678211, (cited By 3; Conference of 6th International ICST Conference on Ad Hoc Networks, ADHOCNETS 2014 ; Conference Date: 18 August 2014 Through 19 August 2014; Conference Code:111559).

Abstract | Links | BibTeX | Tags: Computer crime; Wireless ad hoc networks, Distributed networks; Energy depletion; Internet access; Network behaviors; Network reliability; Network robustness; Queuing network; Wireless multi-hop network, Malware