• Conference Object  

      Adaptive information hovering in VANETs: Robustness and enhancements 

      Xeros, Andreas; Constantinides, Themis; Lestas, Marios; Mylonas, Yiannos; Pitsillides, Andreas; Lesta, Vicky Papadopoulou (IEEE Computer Society, 2013)
      Information hovering is relevant in vehicular ad hoc networks in cases where critical information needs to be made available to all vehicles in a bounded geographical area, called the hovering area, for a specific amount ...
    • Book  

      Algorithmic Game Theory [electronic resource] Second International Symposium, SAGT 2009, Paphos, Cyprus, October 18-20, 2009. Proceedings 

      Μαυρονικόλας, Μάριος; Lesta, Vicky Papadopoulou (Springer-Verlag Berlin Heidelberg, 2009)
    • Book Chapter  

      Algorithmic Game Theory and Applications 

      Mavronicolas, Marios; Lesta, Vicky Papadopoulou; Spirakis, Paul G. (John Wiley & Sons, Inc., 2007)
      Methods from game theory and mechanism design have been proven to be a powerful mathematical tool in order to understand, control, and efficiently design dynamic, complex networks, such as the Internet. Game theory provides ...
    • Conference Object  

      Analysis of probabilistic flooding in VANETs for optimal rebroadcast probabilities 

      Saeed, T.; Lestas, Marios; Mylonas, Yiannos; Pitsillides, Andreas; Lesta, Vicky Papadopoulou (Institute of Electrical and Electronics Engineers Inc., 2016)
      A number of probabilistic flooding schemes have been recently considered in VANETs to address problems of information dissemination in safety applications. The design approach has so far been simulative, a method which ...
    • Conference Object  

      Cooperation among access points for enhanced quality of service in dense wireless environments 

      Antoniou, Josephina; Lesta, Vicky Papadopoulou; Libman, L.; Pitsillides, Andreas; Dehkordi, H. R. (Institute of Electrical and Electronics Engineers Inc., 2014)
      The high popularity of Wi-Fi technology for wireless access has led to a common problem of densely deployed access points (APs) in residential or commercial buildings, competing to use the same or overlapping frequency ...
    • Article  

      Cooperative user-network interactions in next generation communication networks 

      Antoniou, Josephina; Lesta, Vicky Papadopoulou; Vassiliou, Vasos; Pitsillides, Andreas (2010)
      Next Generation Communication Networks employ the idea of convergence, where heterogeneous access technologies may coexist, and a user may be served by anyone of the participating access networks, motivating the emergence ...
    • Article  

      A Decentralized Approach for Self-Coexistence Among Heterogeneous Networks in TVWS 

      Maloku, Hëna; Hamiti, Enver; Fazliu, Zana Limani; Lesta, Vicky Papadopoulou; Pitsillides, Andreas; Rajarajan, Muttukrishnan (2018)
      This paper focuses on coexistence and self-coexistence challenges between secondary heterogeneous wireless networks/users sharing TV Whitespace spectrum. The coexistence problems arise from having several primary and ...
    • Article  

      A graph-theoretic network security game 

      Mavronicolas, Marios; Lesta, Vicky Papadopoulou; Philippou, Anna; Spirakis, Paul G. (2005)
      Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. We model this practical network scenario as a non-cooperative multi-player game on ...
    • Article  

      A graph-theoretic network security game 

      Mavronicolas, Marios; Lesta, Vicky Papadopoulou; Philippou, Anna; Spirakis, Paul G. (2008)
      Consider a network vulnerable to viral infection, where the security software can guarantee safety only to a limited part of it. We model this practical network scenario as a non-cooperative multi-player game on a graph, ...
    • Article  

      How many attackers can selfish defenders catch? 

      Mavronicolas, Marios; Monien, Burkhard; Lesta, Vicky Papadopoulou (2013)
      In a distributed system with attacks and defenses, both attackers and defenders are self-interested entities. We assume a reward-sharing scheme among interdependent defenders
    • Conference Object  

      How many attackers can selfish defenders catch? 

      Mavronicolas, Marios; Monien, Burkhard; Lesta, Vicky Papadopoulou (2008)
      In a distributed system with attacks and defenses, an economic investment in defense mechanisms aims at increasing the degree of system protection against the attacks. We study such investments in the selfish setting, where ...
    • Article  

    • Conference Object  

      Minimizing interference in unmanaged environments of densely deployed wireless access points using a graphical game model 

      Antoniou, Josephina; Lesta, Vicky Papadopoulou; Libman, L.; Pitsillides, Andreas (2012)
      Urban residential areas are becoming increasingly dense with more and more wireless home networks being deployed in close proximity. Considering that in such a dense urban residential area, each unit has its own wireless ...
    • Article  

      Network game with attacker and protector entities 

      Mavronicolas, Marios; Lesta, Vicky Papadopoulou; Philippou, Anna; Spirakis, Paul G. (2005)
      Consider an information network with harmful procedures called attackers (e.g., viruses)
    • Article  

      A network game with attackers and a defender 

      Mavronicolas, Marios; Lesta, Vicky Papadopoulou; Philippou, Anna; Spirakis, Paul G. (2008)
      Consider an information network with threats called attackers
    • Conference Object  

      The power of the defender 

      Gelastou, Marina; Mavronicolas, Marios; Lesta, Vicky Papadopoulou; Philippou, Anna; Spirakis, Paul G. (2006)
      We consider a security problem on a distributed network. We assume a network whose nodes are vulnerable to infection by threats (e.g. viruses), the attackers. A system security software, the defender, is available in the ...
    • Article  

      The price of defense 

      Mavronicolas, Marios; Michael, Loizos; Lesta, Vicky Papadopoulou; Philippou, Anna; Spirakis, Paul G. (2006)
      We consider a strategic game with two classes of confronting randomized players on a graph G(V, E): v attackers, each choosing vertices and wishing to minimize the probability of being caught, and a defender, who chooses ...
    • Article  

      The price of defense and fractional matchings 

      Mavronicolas, Marios; Lesta, Vicky Papadopoulou; Persiano, Giuseppe; Philippou, Anna; Spirakis, Paul G. (2006)
      Consider a network vulnerable to security attacks and equipped with defense mechanisms. How much is the loss in the provided security guarantees due to the selfish nature of attacks and defenses? The Price of Defense was ...
    • Article  

      Speed adaptive probabilistic flooding for vehicular ad hoc networks 

      Mylonas, Yiannos; Lestas, Marios; Pitsillides, Andreas; Ioannou, Petros A.; Lesta, Vicky Papadopoulou (2015)
      A significant issue in vehicular ad hoc networks (VANETs) is the design of an effective broadcast scheme that can facilitate the fast and reliable dissemination of emergency warning messages in the vicinity of an unexpected ...
    • Article  

      Speed adaptive probabilistic flooding for vehicular ad hoc networksAAA 

      Mylonas, Yiannos; Lestas, Marios; Pitsillides, Andreas; Ioannou, Petros A.; Lesta, Vicky Papadopoulou (2015)
      A significant issue in vehicular ad hoc networks (VANETs) is the design of an effective broadcast scheme that can facilitate the fast and reliable dissemination of emergency warning messages in the vicinity of an unexpected ...