Δημοσιεύσεις

5G mobile communication systems 5g; Car manufacturers; Case analysis; Condition; Intelligent transport; Stringent requirement; Technical requirement; Telecom industry; Value proposition; Vehicular Ad hoc networks Adaptation models; Computational model; Epidemic modeling; Hashtags; Infection rates; Information propagation; Tagging; Twitter Anomaly detection; Decoding; Information management; Inverse problems; Matrix algebra Autonomous decision; Component based approach; Component-based architecture; Cross-layer design; Cross-layer framework; Heterogeneous wireless network; Network optimization; Proposed architectures Benchmarking; Life cycle Big data; Data handling; Data reduction; Decision making; Digital storage; Economics; Information analysis; Measurements; Optimization; Problem solving; Resource allocation; Topology Closed queuing networks; Infection efficiency; Multiple attackers Cognitive radio Cognitive radio network; Collision detection; Cross layer resource allocations; Markov Random Fields; Performance analysis; Research interests; Software-defined radios; Technological barriers Commercial vehicles Communications networks; Decentralized networks; Distributed networks; Evolutionary computing; Evolutionary dynamics; Modification mechanism; On-line social networks; Postdoctoral researchers Complex networks Computer architecture; Fleet operations; Network architecture; Ships Gibbs sampling; Malware propagation; Markov Random Fields; Network robustness; Network science Heuristic methods; Social networking (online) Information management Integer programming; Network routing; Radio; Radio systems Malware Network management Network routing Resource allocation Sensor networks Social networking (online) Software radio Time varying networks Wireless ad hoc networks Wireless networks

Show all

2014

Karyotis, V.; Papavassiliou, S.

Evaluation of malware spreading in wireless multihop networks with churn Journal Article

In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 140, pp. 63-74, 2014, ISSN: 18678211, (cited By 3; Conference of 6th International ICST Conference on Ad Hoc Networks, ADHOCNETS 2014 ; Conference Date: 18 August 2014 Through 19 August 2014; Conference Code:111559).

Abstract | Links | BibTeX | Tags: Computer crime; Wireless ad hoc networks, Distributed networks; Energy depletion; Internet access; Network behaviors; Network reliability; Network robustness; Queuing network; Wireless multi-hop network, Malware