Δημοσιεύσεις

5G mobile communication systems Ad hoc networks Algebra; Compressed sensing; Network architecture; Network management Approximation theory; Roads and streets; Signal filtering and prediction; Stochastic systems; Topology Asymptotic analysis; Computer crime; Probability; Queueing networks; Queueing theory; Sensors; Stochastic models; Switching circuits; Telecommunication networks; Wireless networks; Wireless telecommunication systems Cognitive radio Complex networks Complex networks; Random processes; Topology Computer networks Computer networks; Information systems Computer simulation; Cost benefit analysis; Decision theory; Flow rate; Learning algorithms; Markov processes; Network performance; Optimization; Radio Database systems; Large dataset; Semantics Differential equations Dynamic characteristics; Energy-constrained; In-depth understanding; Model and simulation; Operational characteristics; Statistical approach; Stochastic nature; Transmission radius Dynamic network management; Efficient managements; Embedding of graphs; Multi-layer network; Network structures; Networking environment; Operational environments; Structural feature Dynamics; Economic and social effects; Edge computing; Energy utilization; Markov processes; Metals; Mobile computing; Power management Energy utilization; Military applications; Quality of service; Random processes; Topology Greedy routing; Hyperbolic spaces; Network embedding; On-line social networks; Path problems; Recommendation algorithms Information management Malware Network routing Optimization Resource allocation Simulated annealing Social networking (online) Software radio Supply chains Wireless ad hoc networks Wireless networks

Show all

2009

Karyotis, V.; Kakalis, A.; Papavassiliou, S.

On the tradeoff between MAC-layer and network-layer topology-controlled malware spreading schemes in ad hoc and sensor networks Conference

Athens, Glyfada, 2009, ISBN: 9780769536682, (cited By 1; Conference of 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 ; Conference Date: 18 June 2009 Through 23 June 2009; Conference Code:78000).

Abstract | Links | BibTeX | Tags: Ad hoc and sensor networks; Closed queuing networks; Idle energy; MAC layer; Malicious software; Malware spreading; Malwares; Network density; Node degree; Probabilistic framework; Sleeping schedule; Time-dependent; Topology control; Topology control attacks; Wireless nodes, Ad hoc networks; Communication channels (information theory); Computer crime; Energy conservation; Network layers; Queueing networks; Topology, Sensor networks