Δημοσιεύσεις

5G mobile communication systems Ad hoc networks Ad hoc networks; Computer software; Network management; Risk analysis; Topology Alzheimer Disease; Biomarkers; Genetic Predisposition to Disease; Humans; Multifactorial Inheritance; Risk Factors Application programs; Calculations; Complex networks; Computer crime; Computer games; Diffusion; Game theory; Information dissemination article; energy consumption; Markov random field; mobile application; prediction; resource allocation; simulation; workload Betweenness centrality; Greedy routing; Hyperbolic geometry; Network embedding; rigel embedding; Traffic loads Big data; Cluster analysis; Graph theory; Population dynamics; Sensor networks; Ubiquitous computing Cognitive radio Cognitive radio; Image segmentation; Radio systems; Ubiquitous computing; Wireless telecommunication systems Cognitive systems; Computer simulation; Radio systems; Topology Collaborative filtering; Computer aided instruction; Curricula; Genetic algorithms; Online systems; Semantics; Social networking (online); Websites Complex networks Computer crime; Malware; Queueing networks; Time varying networks Computer networks; Magnetorheological fluids; Markov processes; Open source software; Radio; Radio receivers; Radio systems; Resource allocation; Software radio; Structural frames; Testbeds Industry 4.0 Information management Information systems Infrastructure networks; Mobile social networks; Mobile telecommunications; On-line social networks; Personalized advertisings; Resource management; Utility-based framework; Wireless communications International symposium; Joint power and rate control Malware Maxwell equations; Random processes; Random variables; Simulators; Stochastic models; Stochastic systems; Traveling wave antennas Network routing Resource allocation Scalability Social networking (online) Software radio Wireless ad hoc networks Wireless networks

Show all

2014

Karyotis, V.; Papavassiliou, S.

Evaluation of malware spreading in wireless multihop networks with churn Journal Article

In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 140, pp. 63-74, 2014, ISSN: 18678211, (cited By 3; Conference of 6th International ICST Conference on Ad Hoc Networks, ADHOCNETS 2014 ; Conference Date: 18 August 2014 Through 19 August 2014; Conference Code:111559).

Abstract | Links | BibTeX | Tags: Computer crime; Wireless ad hoc networks, Distributed networks; Energy depletion; Internet access; Network behaviors; Network reliability; Network robustness; Queuing network; Wireless multi-hop network, Malware