Δημοσιεύσεις

5G mobile communication systems Ad hoc and sensor networks; Closed queuing networks; Idle energy; MAC layer; Malicious software; Malware spreading; Malwares; Network density; Node degree; Probabilistic framework; Sleeping schedule; Time-dependent; Topology control; Topology control attacks; Wireless nodes Ad hoc networks Ad hoc networks; Computer simulation; Network security; Probabilistic logics; Radio transmission Algebraic approaches; Enabling technologies; Fundamental operations; Future internet; Future networks; Network Monitoring; Network tomography; Research and Technology Development Application programs; Monitoring; Queueing networks aquaculture; industry; technology; wireless communication Biased random walk; Information diffusion; Information sensing; Network Monitoring; On-line social networks biological marker; dopamine 2 receptor; biological marker Clustering algorithms Cognitive radio Cognitive radio; Heuristic methods; Integer programming; Optimization; Radio systems Complex networks Computer crime; Optimization; Parameter estimation; Queueing networks Computer crime; Wireless ad hoc networks Computer simulation; MESH networking; Network management; Random processes; Sensor networks; Topology Emerging technologies; Energy allocations; Energy sharings; Energy-balancing; Fairness; In networks; Resource exchange; Reverse wireless charging; Wireless charging; Wireless power Epidemic modeling; Generalized networks; Information diffusion; Time varying; User interests Information management Information management; Scheduling algorithms Key performance indicators; Mobile communications; Network requirements; Network slicing; Quality-of-service; Requirement analysis; Service experience; Software-defined networkings; Software-defined networks; Transport vertical Malware Multihop networks; Network Science; Topology Control; Trust establishment; Trusted Paths Network routing Resource allocation Social networking (online) Software radio Wireless ad hoc networks Wireless networks

Show all

2014

Karyotis, V.; Papavassiliou, S.

Evaluation of malware spreading in wireless multihop networks with churn Journal Article

In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 140, pp. 63-74, 2014, ISSN: 18678211, (cited By 3; Conference of 6th International ICST Conference on Ad Hoc Networks, ADHOCNETS 2014 ; Conference Date: 18 August 2014 Through 19 August 2014; Conference Code:111559).

Abstract | Links | BibTeX | Tags: Computer crime; Wireless ad hoc networks, Distributed networks; Energy depletion; Internet access; Network behaviors; Network reliability; Network robustness; Queuing network; Wireless multi-hop network, Malware