Δημοσιεύσεις

5G mobile communication systems 5G mobile communication systems; Analog circuits; Cognitive radio; Computation theory; Magnetorheological fluids; Markov processes; Network architecture; Open source software; Radio; Radio receivers; Resource allocation; Structural frames 5G mobile communication systems; Intelligent systems; Intelligent vehicle highway systems; Traffic control Accurate estimation; Efficient monitoring; Monitoring approach; Monitoring techniques; Network monitoring tools; Performance metrics; Software defined networking (SDN); Vehicular networks Ad hoc networks Ad hoc networks; Network layers; Network protocols; Probability distributions; Service oriented architecture (SOA); Topology; Wireless local area networks (WLAN) Analytical models; Data structures; Dynamics; Epidemiology; Information dissemination; Mathematical models Aquaculture; Industry; Technology; Wireless Technology Coarse-fine sensing; Energy detection; Power correlations; Spectrum occupancies; Spectrum sensing Cognitive radio Complex networks Complex networks; Graph theory; Telecommunication networks Computer crime; Optimization; Parameter estimation; Queueing networks Epidemic modeling; Generalized networks; Information diffusion; Time varying; User interests Evolutionary games; Fitness; Generalized networks; Information diffusion; Time varying behavior Fiber optic networks; Game theory; Quality of service; Signal interference; Spurious signal noise; Wireless networks Graph theory Information management Integer programming Lagrange multipliers Malware Multihop networks; Network Science; Topology Control; Trust establishment; Trusted Paths Network routing Resource allocation Social networking (online) Software radio Stochastic models Wireless ad hoc networks Wireless networks

Show all

2007

Karyotis, V.; Papavassiliou, S.

Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework Journal Article

In: Computer Networks, vol. 51, no. 9, pp. 2397-2410, 2007, ISSN: 13891286, (cited By 7).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Algorithms; Computer simulation; Probabilistic logics; Quality of service; Security of data; Topology, Attack modeling; Probabilistic attack modeling; Topology control