Δημοσιεύσεις

5G mobile communication systems 5g; Car manufacturers; Case analysis; Condition; Intelligent transport; Stringent requirement; Technical requirement; Telecom industry; Value proposition; Vehicular Ad hoc networks Adaptation models; Computational model; Epidemic modeling; Hashtags; Infection rates; Information propagation; Tagging; Twitter Anomaly detection; Decoding; Information management; Inverse problems; Matrix algebra Autonomous decision; Component based approach; Component-based architecture; Cross-layer design; Cross-layer framework; Heterogeneous wireless network; Network optimization; Proposed architectures Benchmarking; Life cycle Big data; Data handling; Data reduction; Decision making; Digital storage; Economics; Information analysis; Measurements; Optimization; Problem solving; Resource allocation; Topology Closed queuing networks; Infection efficiency; Multiple attackers Cognitive radio Cognitive radio network; Collision detection; Cross layer resource allocations; Markov Random Fields; Performance analysis; Research interests; Software-defined radios; Technological barriers Commercial vehicles Communications networks; Decentralized networks; Distributed networks; Evolutionary computing; Evolutionary dynamics; Modification mechanism; On-line social networks; Postdoctoral researchers Complex networks Computer architecture; Fleet operations; Network architecture; Ships Gibbs sampling; Malware propagation; Markov Random Fields; Network robustness; Network science Heuristic methods; Social networking (online) Information management Integer programming; Network routing; Radio; Radio systems Malware Network management Network routing Resource allocation Sensor networks Social networking (online) Software radio Time varying networks Wireless ad hoc networks Wireless networks

Show all

2007

Karyotis, V.; Papavassiliou, S.

Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework Journal Article

In: Computer Networks, vol. 51, no. 9, pp. 2397-2410, 2007, ISSN: 13891286, (cited By 7).

Abstract | Links | BibTeX | Tags: Ad hoc networks, Algorithms; Computer simulation; Probabilistic logics; Quality of service; Security of data; Topology, Attack modeling; Probabilistic attack modeling; Topology control