Δημοσιεύσεις

5G mobile communication systems 5G mobile communication systems; Analog circuits; Cognitive radio; Computation theory; Magnetorheological fluids; Markov processes; Network architecture; Open source software; Radio; Radio receivers; Resource allocation; Structural frames Ad hoc networks Analysis and simulation; Communications networks; Greedy routing; Hyperbolic geometry; Network embedding; Scale-free properties; Shortest path routing; Traffic loads Attack strategies; Malware spreading Boolean functions; Code division multiple access; Computer networks; Game theory; Image coding; Throughput; Wireless telecommunication systems Cognitive radio Complex networks Complex networks; Image segmentation; Magnetorheological fluids; Markov processes; Simulated annealing; Stochastic systems; Structural frames Continuum mechanics; Topology Data visualization Distributed networks; Energy depletion; Internet access; Network behaviors; Network reliability; Network robustness; Queuing network; Wireless multi-hop network Energy-constrained mobile threats; Wireless ad hoc network Evolutionary games; Fitness; Generalized networks; Information diffusion; Time varying behavior Industrial robots; Robotics; Testbeds Information management Information use Information use; Network routing; Quality of service; Scheduling Integer programming Lagrange multipliers Malware Network routing Resource allocation Routing protocols Social networking (online) Software radio Telecommunication networks Wireless ad hoc networks Wireless networks

Show all

2007

Karyotis, V.; Papavassiliou, S.; Grammatikou, M.

On the risk-based operation of mobile attacks in wireless ad hoc networks Conference

Glasgow, Scotland, 2007, ISSN: 05361486, (cited By 3; Conference of 2007 IEEE International Conference on Communications, ICC'07 ; Conference Date: 24 June 2007 Through 28 June 2007; Conference Code:71262).

Abstract | Links | BibTeX | Tags: Ad hoc networks; Computer software; Network management; Risk analysis; Topology, Network countermeasures; Risk function metrics; Topology control, Network security