A mixed-integer programming approach for locating jamming devices in a flow-jamming attack (Q1652633): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
Normalize DOI.
 
(2 intermediate revisions by 2 users not shown)
Property / DOI
 
Property / DOI: 10.1016/j.cor.2018.02.020 / rank
Normal rank
 
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.cor.2018.02.020 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2789683754 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A bilevel partial interdiction problem with capacitated facilities and demand outsourcing / rank
 
Normal rank
Property / cites work
 
Property / cites work: A bilevel fixed charge location model for facilities under imminent attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: A bi-level programming model for protection of hierarchical facilities under imminent attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Detecting critical nodes in sparse graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: When LP Is the Cure for Your Matching Woes: Improved Bounds for Stochastic Matchings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partitioning procedures for solving mixed-variables programming problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Interdicting a Nuclear-Weapons Project / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust Wireless Network Jamming Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Jamming communication networks under complete uncertainty / rank
 
Normal rank
Property / cites work
 
Property / cites work: The wireless network jamming problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stochastic Network Interdiction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Accelerating benders decomposition with heuristicmaster problem solutions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revisiting wireless network jamming by SIR-based considerations and multiband robust optimization / rank
 
Normal rank
Property / cites work
 
Property / cites work: Network interdiction via a critical disruption path: branch-and-price algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Shortest-path network interdiction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analysis of facility protection strategies against an uncertain number of attacks: the stochastic R-interdiction median problem with fortification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3098533 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Accelerating Benders Decomposition: Algorithmic Enhancement and Model Selection Criteria / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modeling \(s-t\) path availability to support disaster vulnerability assessment of network infrastructure / rank
 
Normal rank
Property / cites work
 
Property / cites work: The wireless network jamming problem subject to protocol interference / rank
 
Normal rank
Property / cites work
 
Property / cites work: Methods for removing links in a network to minimize the spread of infections / rank
 
Normal rank
Property / cites work
 
Property / cites work: Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Interdiction problems on planar graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: A stochastic programming approach for supply chain network design under uncertainty / rank
 
Normal rank
Property / cites work
 
Property / cites work: A bilevel mixed-integer program for critical infrastructure protection planning / rank
 
Normal rank
Property / cites work
 
Property / cites work: Polynomial‐time algorithms for solving a class of critical node problems on trees and series‐parallel graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5379115 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deterministic network interdiction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Network flow interdiction on planar graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: The \(r\)-interdiction median problem with probabilistic protection and its solution algorithm / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.COR.2018.02.020 / rank
 
Normal rank

Latest revision as of 01:09, 11 December 2024

scientific article
Language Label Description Also known as
English
A mixed-integer programming approach for locating jamming devices in a flow-jamming attack
scientific article

    Statements

    A mixed-integer programming approach for locating jamming devices in a flow-jamming attack (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    11 July 2018
    0 references
    OR in telecommunications
    0 references
    OR in defense
    0 references
    flow-jamming attacks
    0 references
    jamming device placement problem
    0 references
    Benders' decomposition
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references