Δημοσιεύσεις

5G mobile communication systems 5g; Car manufacturers; Case analysis; Condition; Intelligent transport; Stringent requirement; Technical requirement; Telecom industry; Value proposition; Vehicular Ad hoc networks Adaptation models; Computational model; Epidemic modeling; Hashtags; Infection rates; Information propagation; Tagging; Twitter Adaptive systems; Industry; Knowledge management; Societies and institutions Analysis and simulation; Communications networks; Greedy routing; Hyperbolic geometry; Network embedding; Scale-free properties; Shortest path routing; Traffic loads Anomaly detection; Decoding; Information management; Inverse problems; Matrix algebra Attack strategies; Malware spreading Benchmarking; Life cycle Boolean functions; Code division multiple access; Computer networks; Game theory; Image coding; Throughput; Wireless telecommunication systems Cognitive radio Cognitive radio network; Collision detection; Cross layer resource allocations; Markov Random Fields; Performance analysis; Research interests; Software-defined radios; Technological barriers Commercial vehicles Complex networks Computer architecture; Fleet operations; Network architecture; Ships Continuum mechanics; Topology Gibbs sampling; Malware propagation; Markov Random Fields; Network robustness; Network science Heuristic methods; Social networking (online) Information management Information use Malware Network routing Resource allocation Social networking (online) Software radio Telecommunication networks Time varying networks Wireless ad hoc networks Wireless networks

Show all

2009

Karyotis, V.; Kakalis, A.; Papavassiliou, S.

On the tradeoff between MAC-layer and network-layer topology-controlled malware spreading schemes in ad hoc and sensor networks Conference

Athens, Glyfada, 2009, ISBN: 9780769536682, (cited By 1; Conference of 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 ; Conference Date: 18 June 2009 Through 23 June 2009; Conference Code:78000).

Abstract | Links | BibTeX | Tags: Ad hoc and sensor networks; Closed queuing networks; Idle energy; MAC layer; Malicious software; Malware spreading; Malwares; Network density; Node degree; Probabilistic framework; Sleeping schedule; Time-dependent; Topology control; Topology control attacks; Wireless nodes, Ad hoc networks; Communication channels (information theory); Computer crime; Energy conservation; Network layers; Queueing networks; Topology, Sensor networks