Δημοσιεύσεις

5G mobile communication systems 5G mobile communication systems; Analog circuits; Cognitive radio; Computation theory; Magnetorheological fluids; Markov processes; Network architecture; Open source software; Radio; Radio receivers; Resource allocation; Structural frames 5G mobile communication systems; Intelligent systems; Intelligent vehicle highway systems; Traffic control Accurate estimation; Efficient monitoring; Monitoring approach; Monitoring techniques; Network monitoring tools; Performance metrics; Software defined networking (SDN); Vehicular networks Ad hoc networks Analytical models; Data structures; Dynamics; Epidemiology; Information dissemination; Mathematical models Application models; Calculus of variations; Communications networks; Diffusion process; General applications; Global economies; State of the art; Theoretical aspects Aquaculture; Industry; Technology; Wireless Technology Channel assignment and routing; Channel switching; Cognitive radio network; Fairness; MILP; Network re-configuration; problem Cognitive radio Complex networks Data visualization Developed model; Dynamic nodes; Limited energies; Malware attacks; Malware propagation; Network reliability; Network robustness; Product forms Dynamic characteristics; Energy-constrained; In-depth understanding; Model and simulation; Operational characteristics; Statistical approach; Stochastic nature; Transmission radius Energy utilization; Military applications; Quality of service; Random processes; Topology Evolutionary games; Fitness; Generalized networks; Information diffusion; Time varying behavior Graph theory Information management Integer programming Lagrange multipliers Malware Network routing Resource allocation Roads and streets Simulated annealing Social networking (online) Software radio Wireless ad hoc networks Wireless networks

Show all

2009

Karyotis, V.; Kakalis, A.; Papavassiliou, S.

On the tradeoff between MAC-layer and network-layer topology-controlled malware spreading schemes in ad hoc and sensor networks Conference

Athens, Glyfada, 2009, ISBN: 9780769536682, (cited By 1; Conference of 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 ; Conference Date: 18 June 2009 Through 23 June 2009; Conference Code:78000).

Abstract | Links | BibTeX | Tags: Ad hoc and sensor networks; Closed queuing networks; Idle energy; MAC layer; Malicious software; Malware spreading; Malwares; Network density; Node degree; Probabilistic framework; Sleeping schedule; Time-dependent; Topology control; Topology control attacks; Wireless nodes, Ad hoc networks; Communication channels (information theory); Computer crime; Energy conservation; Network layers; Queueing networks; Topology, Sensor networks