Δημοσιεύσεις

5G mobile communication systems Ad hoc networks Algebraic approaches; Enabling technologies; Fundamental operations; Future internet; Future networks; Network Monitoring; Network tomography; Research and Technology Development Analysis and simulation; Area coverages; Coverage problem; Energy-efficient coverages; Minimum coverage; Obstacles; Opaque obstacles; Topology control Analysis and simulation; Communications networks; Greedy routing; Hyperbolic geometry; Network embedding; Scale-free properties; Shortest path routing; Traffic loads Attack modeling; Probabilistic attack modeling; Topology control biological marker; dopamine 2 receptor; biological marker Boolean functions; Code division multiple access; Computer networks; Game theory; Image coding; Throughput; Wireless telecommunication systems Cloud infrastructures; Computational requirements; Distributed energies; Edge computing; Energy aware; Energy optimization; Markov Random Fields; Mobile applications; Resources allocation; Task offloading Cognitive radio Community detection; Heterogeneous sources; Hyperbolic networks; Innovative systems; Novel algorithm; RDF model; Similarity metrics; User friendly Complex networks Continuum mechanics; Topology Industrial robots; Robotics; Testbeds Information management Information management; Scheduling algorithms Information use; Network routing; Quality of service; Scheduling Malware Natural resources management; Resource allocation; Telecommunication networks; Wireless telecommunication systems Network management Network routing Online systems Process control Resource allocation Social networking (online) Software radio Telecommunication networks Wireless ad hoc networks Wireless networks

Show all

2007

Karyotis, V.; Papavassiliou, S.

On the malware spreading over non-propagative wireless ad hoc networks: The attacker's perspective Conference

Chania, Crete Island, 2007, ISBN: 9781595938060, (cited By 4; Conference of Q2SWinet'07: 3rd ACM Workshop on Q2S and Security for Wireless and Mobile Networks ; Conference Date: 22 October 2007 Through 22 October 2007; Conference Code:71773).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Attack strategies; Malware spreading, Computer crime; Optimization; Parameter estimation; Queueing networks