Δημοσιεύσεις

5G mobile communication systems Ad hoc networks Age of information; Delay-Tolerant Network; Delay-tolerant routing; Delivery time; Distributed routing protocols; In networks; Packet Delivery; Packet delivery time; Round-trip-time; Routing-protocol Approximation theory; Roads and streets; Signal filtering and prediction; Stochastic systems; Topology Asymptotic analysis; Computer crime; Probability; Queueing networks; Queueing theory; Sensors; Stochastic models; Switching circuits; Telecommunication networks; Wireless networks; Wireless telecommunication systems Backpressure scheduling; Backpressure scheduling-routing; Distributed energies; Distributed networks; Energy; Energy-transfer; Power exchange; Routings; Wireless data; Wireless energy transfers Behavioral research; Game theory; Health; Social networking (online) Clustering algorithms Cognitive radio Community detection; Complex data; Database approaches; Diverse fields; Hyperbolic networks; Large datasets; New approaches; Resource description framework Complex networks Computer networks; Information systems Computer simulation; Cost benefit analysis; Decision theory; Flow rate; Learning algorithms; Markov processes; Network performance; Optimization; Radio Coverage constraints; Extensive simulations; Influence networks; Information diffusion; Integer programming problems; Online social networks (OSN); Set cover problem; Weighted set covers Differential equations E-learning Emerging technologies; Energy allocations; Energy sharings; Energy-balancing; Fairness; In networks; Resource exchange; Reverse wireless charging; Wireless charging; Wireless power Energy utilization; Military applications; Quality of service; Random processes; Topology Information management Key performance indicators; Mobile communications; Network requirements; Network slicing; Quality-of-service; Requirement analysis; Service experience; Software-defined networkings; Software-defined networks; Transport vertical Malware Network routing Optimization Resource allocation Simulated annealing Social networking (online) Software radio Wireless ad hoc networks Wireless networks

Show all

2009

Karyotis, V.; Kakalis, A.; Papavassiliou, S.

On the tradeoff between MAC-layer and network-layer topology-controlled malware spreading schemes in ad hoc and sensor networks Conference

Athens, Glyfada, 2009, ISBN: 9780769536682, (cited By 1; Conference of 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 ; Conference Date: 18 June 2009 Through 23 June 2009; Conference Code:78000).

Abstract | Links | BibTeX | Tags: Ad hoc and sensor networks; Closed queuing networks; Idle energy; MAC layer; Malicious software; Malware spreading; Malwares; Network density; Node degree; Probabilistic framework; Sleeping schedule; Time-dependent; Topology control; Topology control attacks; Wireless nodes, Ad hoc networks; Communication channels (information theory); Computer crime; Energy conservation; Network layers; Queueing networks; Topology, Sensor networks