Δημοσιεύσεις

5G mobile communication systems 5g; Car manufacturers; Case analysis; Condition; Intelligent transport; Stringent requirement; Technical requirement; Telecom industry; Value proposition; Vehicular Ad hoc networks Adaptation models; Computational model; Epidemic modeling; Hashtags; Infection rates; Information propagation; Tagging; Twitter Anomaly detection; Decoding; Information management; Inverse problems; Matrix algebra Approximation theory; Roads and streets; Signal filtering and prediction; Stochastic systems; Topology Asymptotic analysis; Computer crime; Probability; Queueing networks; Queueing theory; Sensors; Stochastic models; Switching circuits; Telecommunication networks; Wireless networks; Wireless telecommunication systems Benchmarking; Life cycle Cognitive radio Cognitive radio network; Collision detection; Cross layer resource allocations; Markov Random Fields; Performance analysis; Research interests; Software-defined radios; Technological barriers Commercial vehicles Complex networks Computer architecture; Fleet operations; Network architecture; Ships Computer networks; Information systems Computer simulation; Cost benefit analysis; Decision theory; Flow rate; Learning algorithms; Markov processes; Network performance; Optimization; Radio Differential equations Energy utilization; Military applications; Quality of service; Random processes; Topology Heuristic methods; Social networking (online) Information management Malware Network routing Optimization Resource allocation Simulated annealing Social networking (online) Software radio Time varying networks Wireless ad hoc networks Wireless networks

Show all

2006

Karyotis, V.; Papavassiliou, S.; Grammatikou, M.; Maglaris, B.

On the characterization and evaluation of mobile attack strategies in wireless Ad Hoc networks Conference

Institute of Electrical and Electronics Engineers Inc., Cagliari, Sardinia, 2006, ISSN: 15301346, (cited By 4; Conference of 11th IEEE Symposium on Computers and Communications, ISCC 2006 ; Conference Date: 26 June 2006 Through 29 June 2006; Conference Code:69930).

Abstract | Links | BibTeX | Tags: Ad hoc networks; Computer simulation; Network security; Probabilistic logics; Radio transmission, Energy-constrained mobile threats; Wireless ad hoc network, Intrusion detection