Δημοσιεύσεις

5G mobile communication systems Ad hoc networks Adaptive systems; Industry; Knowledge management; Societies and institutions Analysis and simulation; Communications networks; Greedy routing; Hyperbolic geometry; Network embedding; Scale-free properties; Shortest path routing; Traffic loads Attack strategies; Malware spreading Back pressures; Backpressure optimization; Freight companies; Intelligent method; Logistics enterprise; Logistics network; Optimisations; Routings; Scheduling; System framework Benchmarking; Life cycle Boolean functions; Code division multiple access; Computer networks; Game theory; Image coding; Throughput; Wireless telecommunication systems Cognitive radio Complex networks Complex networks; Computational efficiency; Distributed computer systems; Traffic congestion Continuum mechanics; Topology Distributed networks; Energy depletion; Internet access; Network behaviors; Network reliability; Network robustness; Queuing network; Wireless multi-hop network Energy efficiency Energy-constrained mobile threats; Wireless ad hoc network Gibbs sampling; Malware propagation; Markov Random Fields; Network robustness; Network science Heuristic methods; Social networking (online) Industrial equipment; Industrial networks; Industrial robotics; Network infrastructure; Next generation Internet; Remote driving Information management Information use Malware Network routing Resource allocation Semantic Web Social networking (online) Software radio Telecommunication networks Wireless ad hoc networks Wireless networks

Show all

2007

Karyotis, V.; Papavassiliou, S.

On the malware spreading over non-propagative wireless ad hoc networks: The attacker's perspective Conference

Chania, Crete Island, 2007, ISBN: 9781595938060, (cited By 4; Conference of Q2SWinet'07: 3rd ACM Workshop on Q2S and Security for Wireless and Mobile Networks ; Conference Date: 22 October 2007 Through 22 October 2007; Conference Code:71773).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Attack strategies; Malware spreading, Computer crime; Optimization; Parameter estimation; Queueing networks