Δημοσιεύσεις

5G mobile communication systems Ad hoc networks Analysis and simulation; Communications networks; Greedy routing; Hyperbolic geometry; Network embedding; Scale-free properties; Shortest path routing; Traffic loads article; energy consumption; Markov random field; mobile application; prediction; resource allocation; simulation; workload Attack modeling; Probabilistic attack modeling; Topology control Attack strategies; Malware spreading Big data; Cluster analysis; Graph theory; Population dynamics; Sensor networks; Ubiquitous computing Big data; Environmental management; Machinery; Network layers; Network management Boolean functions; Code division multiple access; Computer networks; Game theory; Image coding; Throughput; Wireless telecommunication systems Cognitive radio Complex networks Computational costs; ILL-posed inverse problem; Incremental optimization; Link load measurement; Minimization problems; Traffic Engineering; Traffic matrix estimation; Traffic measurements Constrained recommendations; Information diffusion process; Information overloads; Joint behavior; Online social networks (OSN); Two-step procedure; User constraints; Users' -constraints Design development; Design evaluation; Key performance indicators; Mobile applications; Network infrastructure; Network requirements; Network slicing; Transport vertical; Validation trial; Vehicular service Industry 4.0 Information management Information systems Layered architecture; Logistics company; Logistics platforms; Optimisations; Platform architecture; Platform functionalities; Routings; Scheduling and routing; Systems architecture; Transportation operations Malware Natural resources management; Resource allocation; Telecommunication networks; Wireless telecommunication systems Network management Network routing Process control Resource allocation Social networking (online) Software radio Telecommunication networks Wireless ad hoc networks Wireless networks

Show all

2009

Karyotis, V.; Kakalis, A.; Papavassiliou, S.

On the tradeoff between MAC-layer and network-layer topology-controlled malware spreading schemes in ad hoc and sensor networks Conference

Athens, Glyfada, 2009, ISBN: 9780769536682, (cited By 1; Conference of 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 ; Conference Date: 18 June 2009 Through 23 June 2009; Conference Code:78000).

Abstract | Links | BibTeX | Tags: Ad hoc and sensor networks; Closed queuing networks; Idle energy; MAC layer; Malicious software; Malware spreading; Malwares; Network density; Node degree; Probabilistic framework; Sleeping schedule; Time-dependent; Topology control; Topology control attacks; Wireless nodes, Ad hoc networks; Communication channels (information theory); Computer crime; Energy conservation; Network layers; Queueing networks; Topology, Sensor networks