Δημοσιεύσεις

5G mobile communication systems Accurate estimation; Efficient monitoring; Monitoring approach; Monitoring techniques; Network monitoring tools; Performance metrics; Software defined networking (SDN); Vehicular networks Ad hoc networks Ad hoc networks; Network layers; Network protocols; Probability distributions; Service oriented architecture (SOA); Topology; Wireless local area networks (WLAN) Aquaculture; Industry; Technology; Wireless Technology Back pressures; Backpressure scheduling; Freight management; Logistics system; Management systems; Optimal scheduling; Packet routing; Packet scheduling; Performances evaluation; Routing and scheduling Coarse-fine sensing; Energy detection; Power correlations; Spectrum occupancies; Spectrum sensing Cognitive radio Complex networks Complex networks; Computational efficiency; Distributed computer systems; Traffic congestion Complex networks; Graph theory; Telecommunication networks Computer crime; Optimization; Parameter estimation; Queueing networks Computer crime; Wireless ad hoc networks Decision making; Heterogeneous networks; Markov processes; Network layers; Resource allocation; Structural frames; Wireless networks Epidemic modeling; Generalized networks; Information diffusion; Time varying; User interests Fiber optic networks; Game theory; Quality of service; Signal interference; Spurious signal noise; Wireless networks Graph theory Information management Malware Multihop networks; Network Science; Topology Control; Trust establishment; Trusted Paths Network coding Network routing Resource allocation Semantic Web Social networking (online) Software radio Stochastic models Wireless ad hoc networks Wireless networks

Show all

2009

Karyotis, V.; Kakalis, A.; Papavassiliou, S.

On the tradeoff between MAC-layer and network-layer topology-controlled malware spreading schemes in ad hoc and sensor networks Conference

Athens, Glyfada, 2009, ISBN: 9780769536682, (cited By 1; Conference of 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 ; Conference Date: 18 June 2009 Through 23 June 2009; Conference Code:78000).

Abstract | Links | BibTeX | Tags: Ad hoc and sensor networks; Closed queuing networks; Idle energy; MAC layer; Malicious software; Malware spreading; Malwares; Network density; Node degree; Probabilistic framework; Sleeping schedule; Time-dependent; Topology control; Topology control attacks; Wireless nodes, Ad hoc networks; Communication channels (information theory); Computer crime; Energy conservation; Network layers; Queueing networks; Topology, Sensor networks