The wireless network jamming problem
From MaRDI portal
Publication:2426656
DOI10.1007/s10878-007-9071-7zbMath1149.90124OpenAlexW2037102865MaRDI QIDQ2426656
Clayton W. Commander, Stan Uryasev, Valeriy Ryabchenko, Panos M. Pardalos, Grigoriy Zrazhevsky
Publication date: 23 April 2008
Published in: Journal of Combinatorial Optimization (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10878-007-9071-7
Programming involving graphs or networks (90C35) Integer programming (90C10) Combinatorial optimization (90C27)
Related Items (21)
A representation of risk measures ⋮ Some applications of polynomial optimization in operations research and real-time decision making ⋮ Component-cardinality-constrained critical node problem in graphs ⋮ Polynomial-time identification of robust network flows under uncertain arc failures ⋮ A mixed-integer programming approach for locating jamming devices in a flow-jamming attack ⋮ Mathematical programming techniques for sensor networks ⋮ Solving the Distance-Based Critical Node Problem ⋮ Conditional value‐at‐risk beyond finance: a survey ⋮ Revisiting wireless network jamming by SIR-based considerations and multiband robust optimization ⋮ Obtaining approximately optimal and diverse solutions via dispersion ⋮ Computational risk management techniques for fixed charge network flow problems with uncertain arc failures ⋮ Wireless LAN transmitter location under the threat of jamming attacks ⋮ Radio communications interdiction problem under deterministic and probabilistic jamming ⋮ Jamming communication networks under complete uncertainty ⋮ The critical node detection problem in networks: a survey ⋮ Optimal detection of critical nodes: improvements to model structure and performance ⋮ Complexity of the critical node problem over trees ⋮ A Lagrangean-based heuristics for the target covering problem in wireless sensor network ⋮ Time-Varying Semidefinite Programs ⋮ Robust Critical Node Selection by Benders Decomposition ⋮ Detecting critical nodes in sparse graphs
Cites Work
This page was built for publication: The wireless network jamming problem