Δημοσιεύσεις

5G mobile communication systems 5g; Car manufacturers; Case analysis; Condition; Intelligent transport; Stringent requirement; Technical requirement; Telecom industry; Value proposition; Vehicular Ad hoc and sensor networks; Closed queuing networks; Idle energy; MAC layer; Malicious software; Malware spreading; Malwares; Network density; Node degree; Probabilistic framework; Sleeping schedule; Time-dependent; Topology control; Topology control attacks; Wireless nodes Ad hoc networks Ad hoc networks; Dynamics; Mobile ad hoc networks; Network layers; Resource allocation; Topology; Wireless networks Adaptation models; Computational model; Epidemic modeling; Hashtags; Infection rates; Information propagation; Tagging; Twitter Anomaly detection; Decoding; Information management; Inverse problems; Matrix algebra Code division multiple access; Game theory; Mobile telecommunication systems; Wireless telecommunication systems Cognitive radio Cognitive radio network; Collision detection; Cross layer resource allocations; Markov Random Fields; Performance analysis; Research interests; Software-defined radios; Technological barriers Cognitive radio; Heuristic methods; Integer programming; Optimization; Radio systems Commercial vehicles Complex networks Computer architecture; Fleet operations; Network architecture; Ships Content distribution; Evolutionary modification; Small World Phenomenon; Topology control; Trust management; Wireless multihop networks Gibbs sampling; Malware propagation; Markov Random Fields; Network robustness; Network science Heuristic methods; Social networking (online) Information management Internet; Topology; Vector spaces Malware Network evolution; Network science; Online social networks; Topology control; Wireless multi-hop network Network routing Network security Resource allocation Social networking (online) Software radio Time varying networks Wireless ad hoc networks Wireless networks

Show all

2008

Karyotis, V.; Kakalis, A.; Papavassiliou, S.

Malware-propagative mobile ad hoc networks: Asymptotic behavior analysis Journal Article

In: Journal of Computer Science and Technology, vol. 23, no. 3, pp. 389-399, 2008, ISSN: 10009000, (cited By 25).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Closed queuing networks; Infection efficiency; Multiple attackers, Computer software; Mathematical models; Parameter estimation; Queueing networks