Δημοσιεύσεις

5G mobile communication systems Ad hoc networks Ad hoc networks; Computer software; Network management; Risk analysis; Topology Age of information; Delay-Tolerant Network; Delay-tolerant routing; Delivery time; Distributed routing protocols; In networks; Packet Delivery; Packet delivery time; Round-trip-time; Routing-protocol Autonomous decision; Component based approach; Component-based architecture; Cross-layer design; Cross-layer framework; Heterogeneous wireless network; Network optimization; Proposed architectures Cognitive radio Cognitive radio; Complex networks; Image segmentation; Markov processes; Social networking (online) Cognitive systems; Computer simulation; Radio systems; Topology Communications networks; Decentralized networks; Distributed networks; Evolutionary computing; Evolutionary dynamics; Modification mechanism; On-line social networks; Postdoctoral researchers Community detection; Complex data; Database approaches; Diverse fields; Hyperbolic networks; Large datasets; New approaches; Resource description framework Complex networks Computer crime; Malware; Queueing networks; Time varying networks Database systems; Large dataset; Semantics Dynamics; Economic and social effects; Edge computing; Energy utilization; Markov processes; Metals; Mobile computing; Power management Energy utilization; Internet of things; Radio communication; Smart city; Topology; Wireless sensor networks Greedy routing; Hyperbolic spaces; Network embedding; On-line social networks; Path problems; Recommendation algorithms Information management Intrusion detection Knowledge representation Malware Network routing Quality of service Resource allocation Sensor networks Social networking (online) Software radio Vehicles Wireless ad hoc networks Wireless networks

Show all

2009

Karyotis, V.; Kakalis, A.; Papavassiliou, S.

On the tradeoff between MAC-layer and network-layer topology-controlled malware spreading schemes in ad hoc and sensor networks Conference

Athens, Glyfada, 2009, ISBN: 9780769536682, (cited By 1; Conference of 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 ; Conference Date: 18 June 2009 Through 23 June 2009; Conference Code:78000).

Abstract | Links | BibTeX | Tags: Ad hoc and sensor networks; Closed queuing networks; Idle energy; MAC layer; Malicious software; Malware spreading; Malwares; Network density; Node degree; Probabilistic framework; Sleeping schedule; Time-dependent; Topology control; Topology control attacks; Wireless nodes, Ad hoc networks; Communication channels (information theory); Computer crime; Energy conservation; Network layers; Queueing networks; Topology, Sensor networks