Δημοσιεύσεις

5G mobile communication systems Ad hoc networks Ad hoc networks; Dynamics; Mobile ad hoc networks; Network layers; Resource allocation; Topology; Wireless networks Age of information; Delay-Tolerant Network; Delay-tolerant routing; Delivery time; Distributed routing protocols; In networks; Packet Delivery; Packet delivery time; Round-trip-time; Routing-protocol Approximation theory; Roads and streets; Signal filtering and prediction; Stochastic systems; Topology Cognitive radio Community detection; Complex data; Database approaches; Diverse fields; Hyperbolic networks; Large datasets; New approaches; Resource description framework Complex networks Computer networks Computer networks; Information systems Content distribution; Evolutionary modification; Small World Phenomenon; Topology control; Trust management; Wireless multihop networks Database systems; Large dataset; Semantics Dynamics; Economic and social effects; Edge computing; Energy utilization; Markov processes; Metals; Mobile computing; Power management Energy utilization; Internet of things; Radio communication; Smart city; Topology; Wireless sensor networks Greedy routing; Hyperbolic spaces; Network embedding; On-line social networks; Path problems; Recommendation algorithms Information management Malware Network routing Network security Node distribution; Nonuniform; Point process; Topology control Optimization Quality of service Radio systems; Sensors; Surveys Resource allocation Social networking (online) Software radio Vehicles Wireless ad hoc networks Wireless networks

Show all

2014

Karyotis, V.; Papavassiliou, S.

Evaluation of malware spreading in wireless multihop networks with churn Journal Article

In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 140, pp. 63-74, 2014, ISSN: 18678211, (cited By 3; Conference of 6th International ICST Conference on Ad Hoc Networks, ADHOCNETS 2014 ; Conference Date: 18 August 2014 Through 19 August 2014; Conference Code:111559).

Abstract | Links | BibTeX | Tags: Computer crime; Wireless ad hoc networks, Distributed networks; Energy depletion; Internet access; Network behaviors; Network reliability; Network robustness; Queuing network; Wireless multi-hop network, Malware