Δημοσιεύσεις

5G mobile communication systems 5G mobile communication systems; Analog circuits; Cognitive radio; Computation theory; Magnetorheological fluids; Markov processes; Network architecture; Open source software; Radio; Radio receivers; Resource allocation; Structural frames Ad hoc networks Ad hoc networks; Network layers; Network protocols; Probability distributions; Service oriented architecture (SOA); Topology; Wireless local area networks (WLAN) Algorithms; Computer simulation; Probabilistic logics; Quality of service; Security of data; Topology Analysis frameworks; Clustering coefficient; Edge churn; Future internet; Heterogeneous access; Multi-dimensional vectors; Network evolution; Network properties Coarse-fine sensing; Energy detection; Power correlations; Spectrum occupancies; Spectrum sensing Cognitive radio Complex networks Complex networks; Image segmentation; Magnetorheological fluids; Markov processes; Simulated annealing; Stochastic systems; Structural frames Continuum mechanics; Energy utilization; Topology Cross-layer design; Network utility maximization; Network utility maximizations (NUM); Optimality; Realistic operational conditions; Resource allocation problem; Topology evolution; Wireless multi-hop network Data visualization Distributed power; Generic frameworks; Good put; Nash equilibrium point; Non-cooperative games; Physical limitations; Power consumption; Rate allocation; Rate Control; Utility functions; Wireless CDMA ad hoc networks Electric network topology; Telecommunication networks; Topology Evolutionary games; Fitness; Generalized networks; Information diffusion; Time varying behavior Industrial robots; Robotics; Testbeds Information management Information use; Network routing; Quality of service; Scheduling Integer programming Lagrange multipliers Malware Network routing Resource allocation Routing protocols Social networking (online) Software radio Wireless ad hoc networks Wireless networks

Show all

2008

Karyotis, V.; Kakalis, A.; Papavassiliou, S.

Malware-propagative mobile ad hoc networks: Asymptotic behavior analysis Journal Article

In: Journal of Computer Science and Technology, vol. 23, no. 3, pp. 389-399, 2008, ISSN: 10009000, (cited By 25).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Closed queuing networks; Infection efficiency; Multiple attackers, Computer software; Mathematical models; Parameter estimation; Queueing networks