메뉴 건너뛰기




Volumn , Issue , 2008, Pages 207-216

Linear programming models for jamming attacks on network traffic flows

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; COMPUTER CRIME; DYNAMIC PROGRAMMING; ELECTRONIC WARFARE; INTERNET; JAMMING; LINEARIZATION; MILITARY OPERATIONS; OPTIMIZATION; PARTICLE SIZE ANALYSIS; TRAFFIC SURVEYS; WIRELESS NETWORKS;

EID: 51949093106     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WIOPT.2008.4586066     Document Type: Conference Paper
Times cited : (47)

References (11)
  • 4
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • Washington, DC, Aug
    • J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proc. USENIX Security Symposium, Washington, DC, Aug. 2003.
    • (2003) Proc. USENIX Security Symposium
    • Bellardo, J.1    Savage, S.2
  • 6
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Oct
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 7
    • 18844450713 scopus 로고    scopus 로고
    • On link layer denial of service in data wireless LANs
    • May
    • G. Lin and G. Noubir, "On link layer denial of service in data wireless LANs," Wireless Communications and Mobile Computing, vol. 5, no. 3, pp. 273-284, May 2005.
    • (2005) Wireless Communications and Mobile Computing , vol.5 , Issue.3 , pp. 273-284
    • Lin, G.1    Noubir, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.