The wireless network jamming problem
From MaRDI portal
Recommendations
- The wireless network jamming problem subject to protocol interference
- Robust wireless network jamming problems
- Wireless LAN transmitter location under the threat of jamming attacks
- scientific article; zbMATH DE number 1756641
- Countermeasures against radio jamming attacks in wireless sensor networks
- Revisiting wireless network jamming by SIR-based considerations and multiband robust optimization
- Interference in large wireless networks
- scientific article; zbMATH DE number 5639847
Cites work
- scientific article; zbMATH DE number 3639144 (Why is no real title available?)
- scientific article; zbMATH DE number 194544 (Why is no real title available?)
- scientific article; zbMATH DE number 5070513 (Why is no real title available?)
- Future paths for integer programming and links to artificial intelligence
- Introduction to the theory of probabilistic functions and percentiles (value-at-risk)
- Three Problems in Search of a Measure
Cited in
(27)- A representation of risk measures
- Radio communications interdiction problem under deterministic and probabilistic jamming
- Detecting critical nodes in sparse graphs
- Robust wireless network jamming problems
- Some applications of polynomial optimization in operations research and real-time decision making
- The critical node detection problem in networks: a survey
- Optimal detection of critical nodes: improvements to model structure and performance
- Complexity of the critical node problem over trees
- scientific article; zbMATH DE number 1756641 (Why is no real title available?)
- Component-cardinality-constrained critical node problem in graphs
- The critical node game
- A mixed-integer programming approach for locating jamming devices in a flow-jamming attack
- Mathematical programming techniques for sensor networks
- The wireless network jamming problem subject to protocol interference
- scientific article; zbMATH DE number 795408 (Why is no real title available?)
- Revisiting wireless network jamming by SIR-based considerations and multiband robust optimization
- Computational risk management techniques for fixed charge network flow problems with uncertain arc failures
- Robust critical node selection by Benders decomposition
- Time-Varying Semidefinite Programs
- Polynomial-time identification of robust network flows under uncertain arc failures
- Obtaining approximately optimal and diverse solutions via dispersion
- Jamming communication networks under complete uncertainty
- Solving the Distance-Based Critical Node Problem
- A Lagrangean-based heuristics for the target covering problem in wireless sensor network
- Wireless LAN transmitter location under the threat of jamming attacks
- Duopoly signal jamming
- Conditional value‐at‐risk beyond finance: a survey
This page was built for publication: The wireless network jamming problem
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2426656)