Δημοσιεύσεις

5G mobile communication systems Ad hoc and sensor networks; Closed queuing networks; Idle energy; MAC layer; Malicious software; Malware spreading; Malwares; Network density; Node degree; Probabilistic framework; Sleeping schedule; Time-dependent; Topology control; Topology control attacks; Wireless nodes Ad hoc networks Ad hoc networks; Dynamics; Mobile ad hoc networks; Network layers; Resource allocation; Topology; Wireless networks Algebraic approaches; Enabling technologies; Fundamental operations; Future internet; Future networks; Network Monitoring; Network tomography; Research and Technology Development Analysis and simulation; Area coverages; Coverage problem; Energy-efficient coverages; Minimum coverage; Obstacles; Opaque obstacles; Topology control biological marker; dopamine 2 receptor; biological marker Cloud infrastructures; Computational requirements; Distributed energies; Edge computing; Energy aware; Energy optimization; Markov Random Fields; Mobile applications; Resources allocation; Task offloading Code division multiple access; Game theory; Mobile telecommunication systems; Wireless telecommunication systems Cognitive radio Cognitive radio; Heuristic methods; Integer programming; Optimization; Radio systems Community detection; Heterogeneous sources; Hyperbolic networks; Innovative systems; Novel algorithm; RDF model; Similarity metrics; User friendly Complex networks Content distribution; Evolutionary modification; Small World Phenomenon; Topology control; Trust management; Wireless multihop networks Industrial robots; Robotics; Testbeds Information management Information management; Scheduling algorithms Information use; Network routing; Quality of service; Scheduling Internet; Topology; Vector spaces Malware Network evolution; Network science; Online social networks; Topology control; Wireless multi-hop network Network routing Network security Online systems Resource allocation Social networking (online) Software radio Wireless ad hoc networks Wireless networks

Show all

2008

Kastrinogiannis, T.; Karyotis, V.; Papavassiliou, S.

On the problem of joint power and rate control in CDMA ad hoc networks Conference

Santorini, 2008, ISBN: 9781424416530, (cited By 1; Conference of 3rd International Symposium on Wireless Pervasive Computing, ISWPC 2008 ; Conference Date: 7 May 2008 Through 9 May 2008; Conference Code:73424).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Boolean functions; Code division multiple access; Computer networks; Game theory; Image coding; Throughput; Wireless telecommunication systems, International symposium; Joint power and rate control

Kastrinogiannis, T.; Karyotis, V.; Papavassiliou, S.

An opportunistic combined power and rate allocation approach in CDMA ad hoc networks Conference

Princeton, NJ, 2008, ISBN: 1424418437; 9781424418435, (cited By 3; Conference of 2008 IEEE Sarnoff Symposium, SARNOFF ; Conference Date: 28 April 2008 Through 30 April 2008; Conference Code:72891).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Code division multiple access; Game theory; Mobile telecommunication systems; Wireless telecommunication systems, Distributed power; Generic frameworks; Good put; Nash equilibrium point; Non-cooperative games; Physical limitations; Power consumption; Rate allocation; Rate Control; Utility functions; Wireless CDMA ad hoc networks

Karyotis, V.; Kakalis, A.; Papavassiliou, S.

Malware-propagative mobile ad hoc networks: Asymptotic behavior analysis Journal Article

In: Journal of Computer Science and Technology, vol. 23, no. 3, pp. 389-399, 2008, ISSN: 10009000, (cited By 25).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Closed queuing networks; Infection efficiency; Multiple attackers, Computer software; Mathematical models; Parameter estimation; Queueing networks

2007

Karyotis, V.; Grammatikou, M.; Papavassiliou, S.

On the asymptotic behavior of malware-propagative mobile ad hoc networks Conference

Pisa, 2007, ISBN: 1424414555; 9781424414550, (cited By 3; Conference of 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS ; Conference Date: 8 October 2007 Through 11 October 2007; Conference Code:73246).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Asymptotic analysis; Computer crime; Probability; Queueing networks; Queueing theory; Sensors; Stochastic models; Switching circuits; Telecommunication networks; Wireless networks; Wireless telecommunication systems

Karyotis, V.; Papavassiliou, S.

On the malware spreading over non-propagative wireless ad hoc networks: The attacker's perspective Conference

Chania, Crete Island, 2007, ISBN: 9781595938060, (cited By 4; Conference of Q2SWinet'07: 3rd ACM Workshop on Q2S and Security for Wireless and Mobile Networks ; Conference Date: 22 October 2007 Through 22 October 2007; Conference Code:71773).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Attack strategies; Malware spreading, Computer crime; Optimization; Parameter estimation; Queueing networks

Karyotis, V.; Papavassiliou, S.

Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework Journal Article

In: Computer Networks, vol. 51, no. 9, pp. 2397-2410, 2007, ISSN: 13891286, (cited By 7).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Algorithms; Computer simulation; Probabilistic logics; Quality of service; Security of data; Topology, Attack modeling; Probabilistic attack modeling; Topology control