Δημοσιεύσεις

5G mobile communication systems 5g; Car manufacturers; Case analysis; Condition; Intelligent transport; Stringent requirement; Technical requirement; Telecom industry; Value proposition; Vehicular Ad hoc networks Adaptation models; Computational model; Epidemic modeling; Hashtags; Infection rates; Information propagation; Tagging; Twitter Anomaly detection; Decoding; Information management; Inverse problems; Matrix algebra Autonomous decision; Component based approach; Component-based architecture; Cross-layer design; Cross-layer framework; Heterogeneous wireless network; Network optimization; Proposed architectures Benchmarking; Life cycle Big data; Data handling; Data reduction; Decision making; Digital storage; Economics; Information analysis; Measurements; Optimization; Problem solving; Resource allocation; Topology Closed queuing networks; Infection efficiency; Multiple attackers Cognitive radio Cognitive radio network; Collision detection; Cross layer resource allocations; Markov Random Fields; Performance analysis; Research interests; Software-defined radios; Technological barriers Commercial vehicles Communications networks; Decentralized networks; Distributed networks; Evolutionary computing; Evolutionary dynamics; Modification mechanism; On-line social networks; Postdoctoral researchers Complex networks Computer architecture; Fleet operations; Network architecture; Ships Gibbs sampling; Malware propagation; Markov Random Fields; Network robustness; Network science Heuristic methods; Social networking (online) Information management Integer programming; Network routing; Radio; Radio systems Malware Network management Network routing Resource allocation Sensor networks Social networking (online) Software radio Time varying networks Wireless ad hoc networks Wireless networks

Show all

2008

Karyotis, V.; Kakalis, A.; Papavassiliou, S.

Malware-propagative mobile ad hoc networks: Asymptotic behavior analysis Journal Article

In: Journal of Computer Science and Technology, vol. 23, no. 3, pp. 389-399, 2008, ISSN: 10009000, (cited By 25).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Closed queuing networks; Infection efficiency; Multiple attackers, Computer software; Mathematical models; Parameter estimation; Queueing networks