Δημοσιεύσεις

5G mobile communication systems 5G mobile communication systems; Control system synthesis 5g; Car manufacturers; Case analysis; Condition; Intelligent transport; Stringent requirement; Technical requirement; Telecom industry; Value proposition; Vehicular Ad hoc networks Adaptation models; Computational model; Epidemic modeling; Hashtags; Infection rates; Information propagation; Tagging; Twitter Alzheimer Disease; Biomarkers; Genetic Predisposition to Disease; Humans; Multifactorial Inheritance; Risk Factors Analog circuits; Cognitive radio; Network function virtualization; Network management; Radio; Radio receivers; Resource allocation; Software defined networking; Testbeds; Transfer functions; Virtual reality Analysis and simulation; Communications networks; Greedy routing; Hyperbolic geometry; Network embedding; Scale-free properties; Shortest path routing; Traffic loads Approximation algorithms; Economic and social effects; Heuristic algorithms; Mobile edge computing; Mobile telecommunication systems; Polynomial approximation Attack modeling; Probabilistic attack modeling; Topology control Boolean functions; Code division multiple access; Computer networks; Game theory; Image coding; Throughput; Wireless telecommunication systems Cognitive radio Commercial vehicles Complex networks Computer architecture; Fleet operations; Network architecture; Ships Computer networks; Magnetorheological fluids; Markov processes; Open source software; Radio; Radio receivers; Radio systems; Resource allocation; Software radio; Structural frames; Testbeds Information management Malware Natural resources management; Resource allocation; Telecommunication networks; Wireless telecommunication systems Network management Network routing Process control Resource allocation Scalability Social networking (online) Software radio Telecommunication networks Wireless ad hoc networks Wireless networks

Show all

2009

Karyotis, V.; Kakalis, A.; Papavassiliou, S.

On the tradeoff between MAC-layer and network-layer topology-controlled malware spreading schemes in ad hoc and sensor networks Conference

Athens, Glyfada, 2009, ISBN: 9780769536682, (cited By 1; Conference of 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 ; Conference Date: 18 June 2009 Through 23 June 2009; Conference Code:78000).

Abstract | Links | BibTeX | Tags: Ad hoc and sensor networks; Closed queuing networks; Idle energy; MAC layer; Malicious software; Malware spreading; Malwares; Network density; Node degree; Probabilistic framework; Sleeping schedule; Time-dependent; Topology control; Topology control attacks; Wireless nodes, Ad hoc networks; Communication channels (information theory); Computer crime; Energy conservation; Network layers; Queueing networks; Topology, Sensor networks