Δημοσιεύσεις

5G mobile communication systems Ad hoc networks Age of information; Delay-Tolerant Network; Delay-tolerant routing; Delivery time; Distributed routing protocols; In networks; Packet Delivery; Packet delivery time; Round-trip-time; Routing-protocol Application models; Calculus of variations; Communications networks; Diffusion process; General applications; Global economies; State of the art; Theoretical aspects Channel assignment and routing; Channel switching; Cognitive radio network; Fairness; MILP; Network re-configuration; problem Cognitive radio Community detection; Complex data; Database approaches; Diverse fields; Hyperbolic networks; Large datasets; New approaches; Resource description framework Complex networks Computer networks Database systems; Large dataset; Semantics Developed model; Dynamic nodes; Limited energies; Malware attacks; Malware propagation; Network reliability; Network robustness; Product forms Dynamic characteristics; Energy-constrained; In-depth understanding; Model and simulation; Operational characteristics; Statistical approach; Stochastic nature; Transmission radius Dynamic network management; Efficient managements; Embedding of graphs; Multi-layer network; Network structures; Networking environment; Operational environments; Structural feature Dynamics; Economic and social effects; Edge computing; Energy utilization; Markov processes; Metals; Mobile computing; Power management Energy utilization; Internet of things; Radio communication; Smart city; Topology; Wireless sensor networks Energy utilization; Military applications; Quality of service; Random processes; Topology Greedy routing; Hyperbolic spaces; Network embedding; On-line social networks; Path problems; Recommendation algorithms Information management Malware Network routing Quality of service Resource allocation Roads and streets Simulated annealing Social networking (online) Software radio Vehicles Wireless ad hoc networks Wireless networks

Show all

2009

Karyotis, V.; Kakalis, A.; Papavassiliou, S.

On the tradeoff between MAC-layer and network-layer topology-controlled malware spreading schemes in ad hoc and sensor networks Conference

Athens, Glyfada, 2009, ISBN: 9780769536682, (cited By 1; Conference of 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 ; Conference Date: 18 June 2009 Through 23 June 2009; Conference Code:78000).

Abstract | Links | BibTeX | Tags: Ad hoc and sensor networks; Closed queuing networks; Idle energy; MAC layer; Malicious software; Malware spreading; Malwares; Network density; Node degree; Probabilistic framework; Sleeping schedule; Time-dependent; Topology control; Topology control attacks; Wireless nodes, Ad hoc networks; Communication channels (information theory); Computer crime; Energy conservation; Network layers; Queueing networks; Topology, Sensor networks