{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:54:32Z","timestamp":1776102872426,"version":"3.50.1"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2007,3,14]],"date-time":"2007-03-14T00:00:00Z","timestamp":1173830400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comb Optim"],"published-print":{"date-parts":[[2007,9,27]]},"DOI":"10.1007\/s10878-007-9071-7","type":"journal-article","created":{"date-parts":[[2007,3,13]],"date-time":"2007-03-13T15:53:33Z","timestamp":1173801213000},"page":"481-498","source":"Crossref","is-referenced-by-count":57,"title":["The wireless network jamming problem"],"prefix":"10.1007","volume":"14","author":[{"given":"Clayton W.","family":"Commander","sequence":"first","affiliation":[]},{"given":"Panos M.","family":"Pardalos","sequence":"additional","affiliation":[]},{"given":"Valeriy","family":"Ryabchenko","sequence":"additional","affiliation":[]},{"given":"Stan","family":"Uryasev","sequence":"additional","affiliation":[]},{"given":"Grigoriy","family":"Zrazhevsky","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,3,14]]},"reference":[{"key":"9071_CR1","volume-title":"Computers and intractability: a guide to the theory of NP-completeness","author":"MR Garey","year":"1979","unstructured":"Garey MR, Johnson DS (1979) Computers and intractability: a guide to the theory of NP-completeness. Freeman, New York"},{"key":"9071_CR2","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1016\/0305-0548(86)90048-1","volume":"5","author":"F Glover","year":"1986","unstructured":"Glover F (1986) Future paths for integer programming and links to artificial intelligence. Comput Oper Res 5:533\u2013549","journal-title":"Comput Oper Res"},{"key":"9071_CR3","volume-title":"Genetic algorithms in search, optimization, and machine learning","author":"DE Goldberg","year":"1989","unstructured":"Goldberg DE (1989) Genetic algorithms in search, optimization, and machine learning. Addison\u2013Wesley, Reading"},{"key":"9071_CR4","volume-title":"Value-at-risk: theory and practice","author":"G Holton","year":"2003","unstructured":"Holton G (2003) Value-at-risk: theory and practice. Academic, San Diego"},{"key":"9071_CR5","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1080\/00029890.1994.11997003","volume":"101","author":"J King","year":"1994","unstructured":"King J (1994) Three problems in search of a measure. Am Math Mon 101:609\u2013628","journal-title":"Am Math Mon"},{"issue":"2","key":"9071_CR6","first-page":"11","volume":"4","author":"P Krokhmal","year":"2002","unstructured":"Krokhmal P, Palmquist J, Uryasev S (2002) Portfolio optimization with conditional value-at-risk objective and constraints. J Risk 4(2):11\u201327","journal-title":"J Risk"},{"key":"9071_CR7","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/978-1-4757-3758-5_9","volume-title":"Cooperative control: models, applications, and algorithms","author":"P Krokhmal","year":"2003","unstructured":"Krokhmal P, Murphey R, Pardalos P, Uryasev S, Zrazhevski G (2003) Robust decision making: addressing uncertainties in distributions. In: Butenko S, Murphey R, Pardalos P (eds) Cooperative control: models, applications, and algorithms, Kluwer Academic, Dordrecht, pp\u00a0165\u2013185"},{"key":"9071_CR8","first-page":"168","volume-title":"Handbook of applied optimization","author":"LS Pitsoulis","year":"2002","unstructured":"Pitsoulis LS, Resende MGC (2002) Greedy randomized adaptive search procedures. In: Resende MGC, Pardalos\u00a0PM\u00a0(eds) Handbook of applied optimization, Oxford University Press, Oxford, pp\u00a0168\u2013183."},{"key":"9071_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-30165-5","volume-title":"Handbook of optimization in telecommunications","author":"MGC Resende","year":"2006","unstructured":"Resende MGC, Pardalos PM (2006) Handbook of optimization in telecommunications. Springer, New\u00a0York"},{"issue":"3","key":"9071_CR10","doi-asserted-by":"crossref","first-page":"21","DOI":"10.21314\/JOR.2000.038","volume":"2","author":"RT Rockafellar","year":"2000","unstructured":"Rockafellar RT, Uryasev S (2000) Optimization of conditional value-at-risk. J Risk 2(3):21\u201341","journal-title":"J Risk"},{"key":"9071_CR11","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1016\/S0378-4266(02)00271-6","volume":"26","author":"RT Rockafellar","year":"2002","unstructured":"Rockafellar RT, Uryasev S (2002) Conditional value-at-risk for general loss distributions. J Bank Finance 26:1443\u20131471","journal-title":"J Bank Finance"},{"key":"9071_CR12","first-page":"1","volume":"14","author":"S Uryasev","year":"2000","unstructured":"Uryasev S (2000) Conditional value-at-risk: optimization algorithms and applications. Financial Eng News 14:1\u20135","journal-title":"Financial Eng News"}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-007-9071-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10878-007-9071-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-007-9071-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T00:18:11Z","timestamp":1559261891000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10878-007-9071-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3,14]]},"references-count":12,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2007,9,27]]}},"alternative-id":["9071"],"URL":"https:\/\/doi.org\/10.1007\/s10878-007-9071-7","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"value":"1382-6905","type":"print"},{"value":"1573-2886","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,3,14]]}}}