The wireless network jamming problem

From MaRDI portal
Publication:2426656

DOI10.1007/s10878-007-9071-7zbMath1149.90124OpenAlexW2037102865MaRDI QIDQ2426656

Clayton W. Commander, Stan Uryasev, Valeriy Ryabchenko, Panos M. Pardalos, Grigoriy Zrazhevsky

Publication date: 23 April 2008

Published in: Journal of Combinatorial Optimization (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s10878-007-9071-7




Related Items (21)

A representation of risk measuresSome applications of polynomial optimization in operations research and real-time decision makingComponent-cardinality-constrained critical node problem in graphsPolynomial-time identification of robust network flows under uncertain arc failuresA mixed-integer programming approach for locating jamming devices in a flow-jamming attackMathematical programming techniques for sensor networksSolving the Distance-Based Critical Node ProblemConditional value‐at‐risk beyond finance: a surveyRevisiting wireless network jamming by SIR-based considerations and multiband robust optimizationObtaining approximately optimal and diverse solutions via dispersionComputational risk management techniques for fixed charge network flow problems with uncertain arc failuresWireless LAN transmitter location under the threat of jamming attacksRadio communications interdiction problem under deterministic and probabilistic jammingJamming communication networks under complete uncertaintyThe critical node detection problem in networks: a surveyOptimal detection of critical nodes: improvements to model structure and performanceComplexity of the critical node problem over treesA Lagrangean-based heuristics for the target covering problem in wireless sensor networkTime-Varying Semidefinite ProgramsRobust Critical Node Selection by Benders DecompositionDetecting critical nodes in sparse graphs



Cites Work


This page was built for publication: The wireless network jamming problem