Δημοσιεύσεις

5G mobile communication systems Ad hoc networks Algebra; Compressed sensing; Network architecture; Network management Approximation theory; Roads and streets; Signal filtering and prediction; Stochastic systems; Topology Asymptotic analysis; Computer crime; Probability; Queueing networks; Queueing theory; Sensors; Stochastic models; Switching circuits; Telecommunication networks; Wireless networks; Wireless telecommunication systems Cognitive radio Complex networks Complex networks; Random processes; Topology Computer networks Computer networks; Information systems Computer simulation; Cost benefit analysis; Decision theory; Flow rate; Learning algorithms; Markov processes; Network performance; Optimization; Radio Database systems; Large dataset; Semantics Differential equations Dynamic characteristics; Energy-constrained; In-depth understanding; Model and simulation; Operational characteristics; Statistical approach; Stochastic nature; Transmission radius Dynamic network management; Efficient managements; Embedding of graphs; Multi-layer network; Network structures; Networking environment; Operational environments; Structural feature Dynamics; Economic and social effects; Edge computing; Energy utilization; Markov processes; Metals; Mobile computing; Power management Energy utilization; Military applications; Quality of service; Random processes; Topology Greedy routing; Hyperbolic spaces; Network embedding; On-line social networks; Path problems; Recommendation algorithms Information management Malware Network routing Optimization Resource allocation Simulated annealing Social networking (online) Software radio Supply chains Wireless ad hoc networks Wireless networks

Show all

2014

Karyotis, V.; Papavassiliou, S.

Evaluation of malware spreading in wireless multihop networks with churn Journal Article

In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 140, pp. 63-74, 2014, ISSN: 18678211, (cited By 3; Conference of 6th International ICST Conference on Ad Hoc Networks, ADHOCNETS 2014 ; Conference Date: 18 August 2014 Through 19 August 2014; Conference Code:111559).

Abstract | Links | BibTeX | Tags: Computer crime; Wireless ad hoc networks, Distributed networks; Energy depletion; Internet access; Network behaviors; Network reliability; Network robustness; Queuing network; Wireless multi-hop network, Malware