Δημοσιεύσεις

5G mobile communication systems Ad hoc networks Analysis and simulation; Communications networks; Greedy routing; Hyperbolic geometry; Network embedding; Scale-free properties; Shortest path routing; Traffic loads Attack modeling; Probabilistic attack modeling; Topology control Back pressures; Backpressure optimization; Freight companies; Intelligent method; Logistics enterprise; Logistics network; Optimisations; Routings; Scheduling; System framework Benchmarking; Life cycle Boolean functions; Code division multiple access; Computer networks; Game theory; Image coding; Throughput; Wireless telecommunication systems Cognitive radio Complex networks Complex networks; Computational efficiency; Distributed computer systems; Traffic congestion Continuum mechanics; Topology Decision making; Heterogeneous networks; Markov processes; Network layers; Resource allocation; Structural frames; Wireless networks Energy efficiency Gibbs sampling; Malware propagation; Markov Random Fields; Network robustness; Network science Heuristic methods; Social networking (online) Industrial equipment; Industrial networks; Industrial robotics; Network infrastructure; Next generation Internet; Remote driving Information management Malware Natural resources management; Resource allocation; Telecommunication networks; Wireless telecommunication systems Network management Network routing Process control Resource allocation Semantic Web Social networking (online) Software radio Telecommunication networks Wireless ad hoc networks Wireless networks

Show all

2009

Karyotis, V.; Kakalis, A.; Papavassiliou, S.

On the tradeoff between MAC-layer and network-layer topology-controlled malware spreading schemes in ad hoc and sensor networks Conference

Athens, Glyfada, 2009, ISBN: 9780769536682, (cited By 1; Conference of 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 ; Conference Date: 18 June 2009 Through 23 June 2009; Conference Code:78000).

Abstract | Links | BibTeX | Tags: Ad hoc and sensor networks; Closed queuing networks; Idle energy; MAC layer; Malicious software; Malware spreading; Malwares; Network density; Node degree; Probabilistic framework; Sleeping schedule; Time-dependent; Topology control; Topology control attacks; Wireless nodes, Ad hoc networks; Communication channels (information theory); Computer crime; Energy conservation; Network layers; Queueing networks; Topology, Sensor networks