Δημοσιεύσεις

5G mobile communication systems Ad hoc networks Ad hoc networks; Network layers; Network protocols; Probability distributions; Service oriented architecture (SOA); Topology; Wireless local area networks (WLAN) Algebra; Compressed sensing; Network architecture; Network management Charging (batteries); Energy efficiency; Energy transfer; Inductive power transmission; Linear programming; Peer to peer networks; Secondary batteries Coarse-fine sensing; Energy detection; Power correlations; Spectrum occupancies; Spectrum sensing Cognitive radio Complex networks Complex networks; Graph theory; Telecommunication networks Complex networks; Random processes; Topology Computer crime; Optimization; Parameter estimation; Queueing networks Computer networks Database systems; Large dataset; Semantics Dynamic network management; Efficient managements; Embedding of graphs; Multi-layer network; Network structures; Networking environment; Operational environments; Structural feature Dynamics; Economic and social effects; Edge computing; Energy utilization; Markov processes; Metals; Mobile computing; Power management Epidemic modeling; Generalized networks; Information diffusion; Time varying; User interests Fiber optic networks; Game theory; Quality of service; Signal interference; Spurious signal noise; Wireless networks Greedy routing; Hyperbolic spaces; Network embedding; On-line social networks; Path problems; Recommendation algorithms Information management Malware Multihop networks; Network Science; Topology Control; Trust establishment; Trusted Paths Network routing Resource allocation Social networking (online) Software radio Stochastic models Supply chains Wireless ad hoc networks Wireless networks

Show all

2006

Karyotis, V.; Papavassiliou, S.; Grammatikou, M.; Maglaris, B.

On the characterization and evaluation of mobile attack strategies in wireless Ad Hoc networks Conference

Institute of Electrical and Electronics Engineers Inc., Cagliari, Sardinia, 2006, ISSN: 15301346, (cited By 4; Conference of 11th IEEE Symposium on Computers and Communications, ISCC 2006 ; Conference Date: 26 June 2006 Through 29 June 2006; Conference Code:69930).

Abstract | Links | BibTeX | Tags: Ad hoc networks; Computer simulation; Network security; Probabilistic logics; Radio transmission, Energy-constrained mobile threats; Wireless ad hoc network, Intrusion detection