Δημοσιεύσεις

5G mobile communication systems Ad hoc networks Analysis and simulation; Communications networks; Greedy routing; Hyperbolic geometry; Network embedding; Scale-free properties; Shortest path routing; Traffic loads article; energy consumption; Markov random field; mobile application; prediction; resource allocation; simulation; workload Attack modeling; Probabilistic attack modeling; Topology control Attack strategies; Malware spreading Big data; Cluster analysis; Graph theory; Population dynamics; Sensor networks; Ubiquitous computing Big data; Environmental management; Machinery; Network layers; Network management Boolean functions; Code division multiple access; Computer networks; Game theory; Image coding; Throughput; Wireless telecommunication systems Cognitive radio Complex networks Computational costs; ILL-posed inverse problem; Incremental optimization; Link load measurement; Minimization problems; Traffic Engineering; Traffic matrix estimation; Traffic measurements Constrained recommendations; Information diffusion process; Information overloads; Joint behavior; Online social networks (OSN); Two-step procedure; User constraints; Users' -constraints Design development; Design evaluation; Key performance indicators; Mobile applications; Network infrastructure; Network requirements; Network slicing; Transport vertical; Validation trial; Vehicular service Industry 4.0 Information management Information systems Layered architecture; Logistics company; Logistics platforms; Optimisations; Platform architecture; Platform functionalities; Routings; Scheduling and routing; Systems architecture; Transportation operations Malware Natural resources management; Resource allocation; Telecommunication networks; Wireless telecommunication systems Network management Network routing Process control Resource allocation Social networking (online) Software radio Telecommunication networks Wireless ad hoc networks Wireless networks

Show all

2008

Kastrinogiannis, T.; Karyotis, V.; Papavassiliou, S.

On the problem of joint power and rate control in CDMA ad hoc networks Conference

Santorini, 2008, ISBN: 9781424416530, (cited By 1; Conference of 3rd International Symposium on Wireless Pervasive Computing, ISWPC 2008 ; Conference Date: 7 May 2008 Through 9 May 2008; Conference Code:73424).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Boolean functions; Code division multiple access; Computer networks; Game theory; Image coding; Throughput; Wireless telecommunication systems, International symposium; Joint power and rate control

Kastrinogiannis, T.; Karyotis, V.; Papavassiliou, S.

An opportunistic combined power and rate allocation approach in CDMA ad hoc networks Conference

Princeton, NJ, 2008, ISBN: 1424418437; 9781424418435, (cited By 3; Conference of 2008 IEEE Sarnoff Symposium, SARNOFF ; Conference Date: 28 April 2008 Through 30 April 2008; Conference Code:72891).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Code division multiple access; Game theory; Mobile telecommunication systems; Wireless telecommunication systems, Distributed power; Generic frameworks; Good put; Nash equilibrium point; Non-cooperative games; Physical limitations; Power consumption; Rate allocation; Rate Control; Utility functions; Wireless CDMA ad hoc networks

Karyotis, V.; Kakalis, A.; Papavassiliou, S.

Malware-propagative mobile ad hoc networks: Asymptotic behavior analysis Journal Article

In: Journal of Computer Science and Technology, vol. 23, no. 3, pp. 389-399, 2008, ISSN: 10009000, (cited By 25).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Closed queuing networks; Infection efficiency; Multiple attackers, Computer software; Mathematical models; Parameter estimation; Queueing networks

2007

Karyotis, V.; Grammatikou, M.; Papavassiliou, S.

On the asymptotic behavior of malware-propagative mobile ad hoc networks Conference

Pisa, 2007, ISBN: 1424414555; 9781424414550, (cited By 3; Conference of 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS ; Conference Date: 8 October 2007 Through 11 October 2007; Conference Code:73246).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Asymptotic analysis; Computer crime; Probability; Queueing networks; Queueing theory; Sensors; Stochastic models; Switching circuits; Telecommunication networks; Wireless networks; Wireless telecommunication systems

Karyotis, V.; Papavassiliou, S.

On the malware spreading over non-propagative wireless ad hoc networks: The attacker's perspective Conference

Chania, Crete Island, 2007, ISBN: 9781595938060, (cited By 4; Conference of Q2SWinet'07: 3rd ACM Workshop on Q2S and Security for Wireless and Mobile Networks ; Conference Date: 22 October 2007 Through 22 October 2007; Conference Code:71773).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Attack strategies; Malware spreading, Computer crime; Optimization; Parameter estimation; Queueing networks

Karyotis, V.; Papavassiliou, S.

Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework Journal Article

In: Computer Networks, vol. 51, no. 9, pp. 2397-2410, 2007, ISSN: 13891286, (cited By 7).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Algorithms; Computer simulation; Probabilistic logics; Quality of service; Security of data; Topology, Attack modeling; Probabilistic attack modeling; Topology control