Δημοσιεύσεις

5G mobile communication systems Ad hoc networks Ad hoc networks; Communication channels (information theory); Computer crime; Energy conservation; Network layers; Queueing networks; Topology Adaptive systems; Industry; Knowledge management; Societies and institutions Analysis frameworks; Clustering coefficient; Edge churn; Future internet; Heterogeneous access; Multi-dimensional vectors; Network evolution; Network properties Back pressures; Backpressure optimization; Freight companies; Intelligent method; Logistics enterprise; Logistics network; Optimisations; Routings; Scheduling; System framework Benchmarking; Life cycle Cognitive radio Complex networks Complex networks; Computational efficiency; Distributed computer systems; Traffic congestion Continuum mechanics; Energy utilization; Topology Distributed networks; Energy depletion; Internet access; Network behaviors; Network reliability; Network robustness; Queuing network; Wireless multi-hop network Distributed power; Generic frameworks; Good put; Nash equilibrium point; Non-cooperative games; Physical limitations; Power consumption; Rate allocation; Rate Control; Utility functions; Wireless CDMA ad hoc networks Energy efficiency Energy-constrained mobile threats; Wireless ad hoc network Gibbs sampling; Malware propagation; Markov Random Fields; Network robustness; Network science Heuristic methods; Social networking (online) Industrial equipment; Industrial networks; Industrial robotics; Network infrastructure; Next generation Internet; Remote driving Information management Investments; Social networking (online); Social sciences computing; Students; Text processing Malware Network coding Network routing Resource allocation Semantic Web Social networking (online) Software radio Wireless ad hoc networks Wireless networks

Show all

2009

Karyotis, V.; Kakalis, A.; Papavassiliou, S.

On the tradeoff between MAC-layer and network-layer topology-controlled malware spreading schemes in ad hoc and sensor networks Conference

Athens, Glyfada, 2009, ISBN: 9780769536682, (cited By 1; Conference of 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 ; Conference Date: 18 June 2009 Through 23 June 2009; Conference Code:78000).

Abstract | Links | BibTeX | Tags: Ad hoc and sensor networks; Closed queuing networks; Idle energy; MAC layer; Malicious software; Malware spreading; Malwares; Network density; Node degree; Probabilistic framework; Sleeping schedule; Time-dependent; Topology control; Topology control attacks; Wireless nodes, Ad hoc networks; Communication channels (information theory); Computer crime; Energy conservation; Network layers; Queueing networks; Topology, Sensor networks