Δημοσιεύσεις

5G mobile communication systems 5G mobile communication systems; Analog circuits; Cognitive radio; Computation theory; Magnetorheological fluids; Markov processes; Network architecture; Open source software; Radio; Radio receivers; Resource allocation; Structural frames Ad hoc networks Ad hoc networks; Computer software; Network management; Risk analysis; Topology Analysis and simulation; Area coverages; Coverage problem; Energy-efficient coverages; Minimum coverage; Obstacles; Opaque obstacles; Topology control Application programs; Calculations; Complex networks; Computer crime; Computer games; Diffusion; Game theory; Information dissemination Cognitive radio Cognitive radio; Image segmentation; Radio systems; Ubiquitous computing; Wireless telecommunication systems Cognitive systems; Computer simulation; Radio systems; Topology Complex networks Complex networks; Image segmentation; Magnetorheological fluids; Markov processes; Simulated annealing; Stochastic systems; Structural frames Computer crime; Malware; Queueing networks; Time varying networks Data visualization Evolutionary games; Fitness; Generalized networks; Information diffusion; Time varying behavior Industrial robots; Robotics; Testbeds Information management Infrastructure networks; Mobile social networks; Mobile telecommunications; On-line social networks; Personalized advertisings; Resource management; Utility-based framework; Wireless communications Integer programming International symposium; Joint power and rate control Lagrange multipliers Malware Maxwell equations; Random processes; Random variables; Simulators; Stochastic models; Stochastic systems; Traveling wave antennas Network routing Resource allocation Routing protocols Social networking (online) Software radio Wireless ad hoc networks Wireless networks

Show all

2007

Karyotis, V.; Papavassiliou, S.

On the malware spreading over non-propagative wireless ad hoc networks: The attacker's perspective Conference

Chania, Crete Island, 2007, ISBN: 9781595938060, (cited By 4; Conference of Q2SWinet'07: 3rd ACM Workshop on Q2S and Security for Wireless and Mobile Networks ; Conference Date: 22 October 2007 Through 22 October 2007; Conference Code:71773).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Attack strategies; Malware spreading, Computer crime; Optimization; Parameter estimation; Queueing networks