Recommendations
- The wireless network jamming problem subject to protocol interference
- Robust wireless network jamming problems
- Wireless LAN transmitter location under the threat of jamming attacks
- scientific article; zbMATH DE number 1756641
- Countermeasures against radio jamming attacks in wireless sensor networks
- Revisiting wireless network jamming by SIR-based considerations and multiband robust optimization
- Interference in large wireless networks
- scientific article; zbMATH DE number 5639847
Cites work
- scientific article; zbMATH DE number 3639144 (Why is no real title available?)
- scientific article; zbMATH DE number 194544 (Why is no real title available?)
- scientific article; zbMATH DE number 5070513 (Why is no real title available?)
- Future paths for integer programming and links to artificial intelligence
- Introduction to the theory of probabilistic functions and percentiles (value-at-risk)
- Three Problems in Search of a Measure
Cited in
(27)- Time-Varying Semidefinite Programs
- Solving the Distance-Based Critical Node Problem
- A representation of risk measures
- Some applications of polynomial optimization in operations research and real-time decision making
- Component-cardinality-constrained critical node problem in graphs
- Wireless LAN transmitter location under the threat of jamming attacks
- Optimal detection of critical nodes: improvements to model structure and performance
- Duopoly signal jamming
- Complexity of the critical node problem over trees
- Detecting critical nodes in sparse graphs
- The wireless network jamming problem subject to protocol interference
- Mathematical programming techniques for sensor networks
- Robust critical node selection by Benders decomposition
- scientific article; zbMATH DE number 795408 (Why is no real title available?)
- A mixed-integer programming approach for locating jamming devices in a flow-jamming attack
- scientific article; zbMATH DE number 1756641 (Why is no real title available?)
- Radio communications interdiction problem under deterministic and probabilistic jamming
- Conditional value‐at‐risk beyond finance: a survey
- Revisiting wireless network jamming by SIR-based considerations and multiband robust optimization
- A Lagrangean-based heuristics for the target covering problem in wireless sensor network
- Jamming communication networks under complete uncertainty
- The critical node game
- Polynomial-time identification of robust network flows under uncertain arc failures
- Robust wireless network jamming problems
- Obtaining approximately optimal and diverse solutions via dispersion
- Computational risk management techniques for fixed charge network flow problems with uncertain arc failures
- The critical node detection problem in networks: a survey
This page was built for publication: The wireless network jamming problem
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2426656)