Δημοσιεύσεις

5G mobile communication systems 5G mobile communication systems; Analog circuits; Cognitive radio; Computation theory; Magnetorheological fluids; Markov processes; Network architecture; Open source software; Radio; Radio receivers; Resource allocation; Structural frames 5G mobile communication systems; Intelligent systems; Intelligent vehicle highway systems; Traffic control Accurate estimation; Efficient monitoring; Monitoring approach; Monitoring techniques; Network monitoring tools; Performance metrics; Software defined networking (SDN); Vehicular networks Ad hoc networks Ad hoc networks; Computer software; Network management; Risk analysis; Topology Analytical models; Data structures; Dynamics; Epidemiology; Information dissemination; Mathematical models Application programs; Calculations; Complex networks; Computer crime; Computer games; Diffusion; Game theory; Information dissemination Aquaculture; Industry; Technology; Wireless Technology Cognitive radio Cognitive radio; Image segmentation; Radio systems; Ubiquitous computing; Wireless telecommunication systems Cognitive systems; Computer simulation; Radio systems; Topology Complex networks Computer crime; Malware; Queueing networks; Time varying networks Evolutionary games; Fitness; Generalized networks; Information diffusion; Time varying behavior Graph theory Information management Infrastructure networks; Mobile social networks; Mobile telecommunications; On-line social networks; Personalized advertisings; Resource management; Utility-based framework; Wireless communications Integer programming International symposium; Joint power and rate control Lagrange multipliers Malware Maxwell equations; Random processes; Random variables; Simulators; Stochastic models; Stochastic systems; Traveling wave antennas Network routing Resource allocation Social networking (online) Software radio Wireless ad hoc networks Wireless networks

Show all

2014

Karyotis, V.; Papavassiliou, S.

Evaluation of malware spreading in wireless multihop networks with churn Journal Article

In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 140, pp. 63-74, 2014, ISSN: 18678211, (cited By 3; Conference of 6th International ICST Conference on Ad Hoc Networks, ADHOCNETS 2014 ; Conference Date: 18 August 2014 Through 19 August 2014; Conference Code:111559).

Abstract | Links | BibTeX | Tags: Computer crime; Wireless ad hoc networks, Distributed networks; Energy depletion; Internet access; Network behaviors; Network reliability; Network robustness; Queuing network; Wireless multi-hop network, Malware