Jammer placement to partition wireless network
暂无分享,去创建一个
Xin Li | John M. Shea | Eduardo L. Pasiliao | Jixing Feng | J. Shea | E. Pasiliao | Xin Li | Jixin Feng
[1] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[2] Guevara Noubir,et al. Quantifying the Impact of Efficient Cross-Layer Jamming Attacks via Network Traffic Flows , 2022 .
[3] Alex Pothen,et al. PARTITIONING SPARSE MATRICES WITH EIGENVECTORS OF GRAPHS* , 1990 .
[4] Curt Jones,et al. Finding Good Approximate Vertex and Edge Partitions is NP-Hard , 1992, Inf. Process. Lett..
[5] Mathew D. Penrose,et al. Random Geometric Graphs , 2003 .
[6] S.,et al. An Efficient Heuristic Procedure for Partitioning Graphs , 2022 .
[7] Ali Kaveh,et al. Solving the conditional and unconditional p-center problem with modified harmony search: A real case study , 2011 .
[8] John M. Shea,et al. Energy-efficient jamming attack in IEEE 802.11 MAC , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[9] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[10] David S. Johnson,et al. Some Simplified NP-Complete Graph Problems , 1976, Theor. Comput. Sci..
[11] H. B. Russell,et al. Routing in frequency-hop packet radio networks with partial-band jamming , 1990, Conference Proceedings on Tactical Communications, Vol.1..
[12] Wayne E. Stark,et al. Performance of Reed-Solomon Coded Frequency-Hop Spread-Spectrum Communications in Partial-Band Interference , 1985, IEEE Trans. Commun..
[13] Patrick Tague,et al. Stochastic optimization of flow-jamming attacks in multichannel wireless networks , 2013, 2013 IEEE International Conference on Communications (ICC).
[14] Jitendra Malik,et al. Normalized cuts and image segmentation , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[15] Patrick Tague,et al. MeshJam: Intelligent Jamming Attack and Defense in IEEE 802.11s Wireless Mesh Networks , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.
[16] Xin-She Yang. Harmony Search as a Metaheuristic Algorithm , 2009 .
[17] Loukas Lazos,et al. Selective Jamming Attacks in Wireless Networks , 2010, 2010 IEEE International Conference on Communications.
[18] Patrick Tague,et al. Improving anti-jamming capability and increasing jamming impact with mobility control , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).
[19] Satyajayant Misra,et al. Measures and Countermeasures for Null Frequency Jamming of On-Demand Routing Protocols in Wireless Ad Hoc Networks , 2012, IEEE Transactions on Wireless Communications.
[20] Maxim Raya,et al. DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.
[21] Zong Woo Geem,et al. A New Heuristic Optimization Algorithm: Harmony Search , 2001, Simul..
[22] Joseph W. H. Liu,et al. Using domain decomposition to find graph bisectors , 1997 .