![]() |
Volumn , Issue , 2008, Pages 207-216
|
Linear programming models for jamming attacks on network traffic flows
|
Author keywords
[No Author keywords available]
|
Indexed keywords
AD HOC NETWORKS;
COMPUTER CRIME;
DYNAMIC PROGRAMMING;
ELECTRONIC WARFARE;
INTERNET;
JAMMING;
LINEARIZATION;
MILITARY OPERATIONS;
OPTIMIZATION;
PARTICLE SIZE ANALYSIS;
TRAFFIC SURVEYS;
WIRELESS NETWORKS;
CENTRALIZED CONTROL;
DISTRIBUTED FLOW;
INTERNATIONAL SYMPOSIUM;
JAMMERS;
LINEAR PROGRAMMING FORMULATIONS;
LINEAR PROGRAMMING MODELS;
NETWORK ATTACKS;
NETWORK FLOWS;
NETWORK TRAFFICS;
NEW CLASS;
PROGRAMMING FRAMEWORKS;
TRAFFIC FLOWING;
LINEAR PROGRAMMING;
|
EID: 51949093106
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/WIOPT.2008.4586066 Document Type: Conference Paper |
Times cited : (47)
|
References (11)
|