Δημοσιεύσεις

5G mobile communication systems Ad hoc and sensor networks; Closed queuing networks; Idle energy; MAC layer; Malicious software; Malware spreading; Malwares; Network density; Node degree; Probabilistic framework; Sleeping schedule; Time-dependent; Topology control; Topology control attacks; Wireless nodes Ad hoc networks Ad hoc networks; Computer simulation; Network security; Probabilistic logics; Radio transmission Algebraic approaches; Enabling technologies; Fundamental operations; Future internet; Future networks; Network Monitoring; Network tomography; Research and Technology Development Application programs; Monitoring; Queueing networks aquaculture; industry; technology; wireless communication Biased random walk; Information diffusion; Information sensing; Network Monitoring; On-line social networks biological marker; dopamine 2 receptor; biological marker Clustering algorithms Cognitive radio Cognitive radio; Heuristic methods; Integer programming; Optimization; Radio systems Complex networks Computer crime; Optimization; Parameter estimation; Queueing networks Computer crime; Wireless ad hoc networks Computer simulation; MESH networking; Network management; Random processes; Sensor networks; Topology Emerging technologies; Energy allocations; Energy sharings; Energy-balancing; Fairness; In networks; Resource exchange; Reverse wireless charging; Wireless charging; Wireless power Epidemic modeling; Generalized networks; Information diffusion; Time varying; User interests Information management Information management; Scheduling algorithms Key performance indicators; Mobile communications; Network requirements; Network slicing; Quality-of-service; Requirement analysis; Service experience; Software-defined networkings; Software-defined networks; Transport vertical Malware Multihop networks; Network Science; Topology Control; Trust establishment; Trusted Paths Network routing Resource allocation Social networking (online) Software radio Wireless ad hoc networks Wireless networks

Show all

2006

Karyotis, V.; Papavassiliou, S.; Grammatikou, M.; Maglaris, B.

On the characterization and evaluation of mobile attack strategies in wireless Ad Hoc networks Conference

Institute of Electrical and Electronics Engineers Inc., Cagliari, Sardinia, 2006, ISSN: 15301346, (cited By 4; Conference of 11th IEEE Symposium on Computers and Communications, ISCC 2006 ; Conference Date: 26 June 2006 Through 29 June 2006; Conference Code:69930).

Abstract | Links | BibTeX | Tags: Ad hoc networks; Computer simulation; Network security; Probabilistic logics; Radio transmission, Energy-constrained mobile threats; Wireless ad hoc network, Intrusion detection