{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T06:13:23Z","timestamp":1726467203534},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers &amp; Industrial Engineering"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1016\/j.cie.2017.02.022","type":"journal-article","created":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T03:35:37Z","timestamp":1488339337000},"page":"25-38","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Analyzing the robustness of an array of wireless access points to mobile jammers"],"prefix":"10.1016","volume":"107","author":[{"given":"David","family":"Schweitzer","sequence":"first","affiliation":[]},{"given":"Ruholla","family":"Jafari-Marandi","sequence":"additional","affiliation":[]},{"given":"Hugh","family":"Medal","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cie.2017.02.022_b0005","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.cor.2012.08.013","article-title":"A bilevel partial interdiction problem with capacitated facilities and demand outsourcing","volume":"41","author":"Aksen","year":"2014","journal-title":"Computers & Operations Research"},{"key":"10.1016\/j.cie.2017.02.022_b0010","series-title":"Proceedings of the twenty-seventh ACM symposium on principles of distributed computing","first-page":"45","article-title":"A jamming-resistant mac protocol for single-hop wireless networks","author":"Awerbuch","year":"2008"},{"issue":"7","key":"10.1016\/j.cie.2017.02.022_b0015","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1111\/risa.12175","article-title":"Stochastic measures of network resilience: Applications to waterway commodity flows","volume":"34","author":"Baroud","year":"2014","journal-title":"Risk Analysis"},{"issue":"5","key":"10.1016\/j.cie.2017.02.022_b0020","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1504\/EJIE.2013.057385","article-title":"A leader-follower game for the point coverage problem in wireless sensor networks","volume":"7","author":"Basdere","year":"2013","journal-title":"European Journal of Industrial Engineering"},{"issue":"4","key":"10.1016\/j.cie.2017.02.022_b0025","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1287\/opre.1080.0643","article-title":"Interdicting a nuclear-weapons project","volume":"57","author":"Brown","year":"2009","journal-title":"Operations Research"},{"issue":"1","key":"10.1016\/j.cie.2017.02.022_b0030","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1287\/trsc.1100.0340","article-title":"Optimal allocation of protective resources in shortest-path networks","volume":"45","author":"Cappanera","year":"2011","journal-title":"Transportation Science"},{"issue":"3","key":"10.1016\/j.cie.2017.02.022_b0035","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1111\/j.1467-8306.2004.00410.x","article-title":"Identifying critical infrastructure: The median and covering facility interdiction problems","volume":"94","author":"Church","year":"2004","journal-title":"Annals of the Association of American Geographers"},{"key":"10.1016\/j.cie.2017.02.022_b0040","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-540-88063-9_23","article-title":"Robust wireless network jamming problems","author":"Commander","year":"2009","journal-title":"Optimization and Cooperative Control Strategies"},{"key":"10.1016\/j.cie.2017.02.022_b0045","article-title":"A key management scheme for wireless sensor networks using deployment knowledge","volume":"Vol. 1","author":"Du","year":"2004"},{"key":"10.1016\/j.cie.2017.02.022_b0050","unstructured":"Farahani & Shahin (2008). Zigbee wireless networks and transceivers (pp. 172\u2013173)."},{"key":"10.1016\/j.cie.2017.02.022_b0055","series-title":"Globecom workshops (GC Wkshps)","first-page":"1487","article-title":"Jammer placement to partition wireless network","author":"Feng","year":"2014"},{"issue":"3","key":"10.1016\/j.cie.2017.02.022_b0060","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1002\/net.20238","article-title":"Minimizing a stochastic maximum-reliability path","volume":"52","author":"Feng","year":"2008","journal-title":"Networks"},{"issue":"2","key":"10.1016\/j.cie.2017.02.022_b0065","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1287\/inte.15.2.10","article-title":"An applications oriented guide to lagrangian relaxation","volume":"15","author":"Fisher","year":"1985","journal-title":"Interfaces"},{"issue":"4","key":"10.1016\/j.cie.2017.02.022_b0070","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1002\/nav.20079","article-title":"A decomposition algorithm applied to planning the interdiction of stochastic networks","volume":"52","author":"Held","year":"2005","journal-title":"Naval Research Logistics (NRL)"},{"key":"10.1016\/j.cie.2017.02.022_b0075","series-title":"Proceedings of 18th international conference computer communications and networks, 2009. ICCCN 2009","first-page":"1","article-title":"Optimal wireless network restoration under jamming attack","author":"Jiang","year":"2009"},{"issue":"1","key":"10.1016\/j.cie.2017.02.022_b0080","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/1464420.1464426","article-title":"Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols","volume":"5","author":"Law","year":"2009","journal-title":"ACM Transactions on Sensor Networks (TOSN)"},{"issue":"1","key":"10.1016\/j.cie.2017.02.022_b0085","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1080\/07408170600729192","article-title":"Algorithms for discrete and continuous multicommodity flow network interdiction problems","volume":"39","author":"Lim","year":"2007","journal-title":"IIE Transactions"},{"key":"10.1016\/j.cie.2017.02.022_b0090","series-title":"INFOCOM, 2010 proceedings IEEE","first-page":"1","article-title":"Randomized differential DSSS: Jamming-resistant wireless broadcast communication","author":"Liu","year":"2010"},{"issue":"1","key":"10.1016\/j.cie.2017.02.022_b0095","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s10479-012-1170-x","article-title":"The stochastic interdiction median problem with disruption intensity levels","volume":"201","author":"Losada","year":"2012","journal-title":"Annals of Operations Research"},{"issue":"4","key":"10.1016\/j.cie.2017.02.022_b0100","doi-asserted-by":"crossref","first-page":"553","DOI":"10.15388\/Informatica.2010.305","article-title":"A dynamic network interdiction problem","volume":"21","author":"Lunday","year":"2010","journal-title":"Informatica"},{"issue":"5","key":"10.1016\/j.cie.2017.02.022_b0105","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1080\/0740817X.2011.602659","article-title":"Multi-period network interdiction problems with applications to city-level drug enforcement","volume":"44","author":"Malaviya","year":"2012","journal-title":"IIE Transactions"},{"issue":"2","key":"10.1016\/j.cie.2017.02.022_b0110","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1072989.1072995","article-title":"Access and mobility of wireless PDA users","volume":"9","author":"McNett","year":"2005","journal-title":"ACM SIGMOBILE Mobile Computing Communications Review"},{"issue":"1","key":"10.1016\/j.cie.2017.02.022_b0115","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1137\/0213014","article-title":"On the complexity of some common geometric location problems","volume":"13","author":"Megiddo","year":"1984","journal-title":"SIAM Journal on Computing"},{"issue":"2","key":"10.1016\/j.cie.2017.02.022_b0120","doi-asserted-by":"publisher","DOI":"10.1162\/EVCO_a_00137","article-title":"Determining relative importance and effective settings for genetic algorithm control parameters","volume":"23","author":"Mills","year":"2015","journal-title":"Evolutionary Computation"},{"year":"2011","series-title":"Stochastic network interdiction","author":"Morton","key":"10.1016\/j.cie.2017.02.022_b0125"},{"issue":"1","key":"10.1016\/j.cie.2017.02.022_b0130","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/07408170500488956","article-title":"Models for nuclear smuggling interdiction","volume":"39","author":"Morton","year":"2007","journal-title":"IIE Transactions"},{"key":"10.1016\/j.cie.2017.02.022_b0135","series-title":"INFOCOM 2007. 26th IEEE international conference on computer communications. IEEE","first-page":"2526","article-title":"Using channel hopping to increase 802.11 resilience to jamming attacks","author":"Navda","year":"2007"},{"issue":"1","key":"10.1016\/j.cie.2017.02.022_b0140","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1109\/TSG.2012.2229398","article-title":"Detecting critical nodes in interdependent power networks for vulnerability assessment","volume":"4","author":"Nguyen","year":"2013","journal-title":"IEEE Transactions Smart Grid"},{"issue":"3","key":"10.1016\/j.cie.2017.02.022_b0145","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/961268.961277","article-title":"Low-power dos attacks in data wireless lans and countermeasures","volume":"7","author":"Noubir","year":"2003","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"10.1016\/j.cie.2017.02.022_b0150","series-title":"Global telecommunications conference, 2009. GLOBECOM 2009. IEEE","first-page":"1","article-title":"Lightweight jammer localization in wireless networks: System design and implementation","author":"Pelechrinis","year":"2009"},{"issue":"4","key":"10.1016\/j.cie.2017.02.022_b0155","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.cie.2013.04.014","article-title":"Maximum dynamic network flow interdiction problem: New formulation and solution procedures","volume":"65","author":"Rad","year":"2013","journal-title":"Computers & Industrial Engineering"},{"issue":"2","key":"10.1016\/j.cie.2017.02.022_b0160","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.cie.2010.04.004","article-title":"A bi-objective approach for shortest-path network interdiction","volume":"59","author":"Ramirez-Marquez","year":"2010","journal-title":"Computers & Industrial Engineering"},{"key":"10.1016\/j.cie.2017.02.022_b0165","series-title":"31st International conference distributed computing systems (ICDCS), 2011","first-page":"507","article-title":"Competitive and fair medium access despite reactive jamming","author":"Richa","year":"2011"},{"issue":"1","key":"10.1016\/j.cie.2017.02.022_b0170","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1002\/net.20458","article-title":"Deception tactics for network interdiction: A multiobjective approach","volume":"60","author":"Salmer\u00f3n","year":"2012","journal-title":"Networks"},{"issue":"1","key":"10.1016\/j.cie.2017.02.022_b0175","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/TPWRS.2008.2004825","article-title":"Worst-case interdiction analysis of large-scale electric power grids","volume":"24","author":"Salmer\u00f3n","year":"2009","journal-title":"IEEE Transactions Power Systems"},{"key":"10.1016\/j.cie.2017.02.022_b0180","series-title":"IIE annual conference. Proceedings","first-page":"1003","article-title":"A bi-level programming model for the wireless network jamming placement problem","author":"Vadlamani","year":"2014"},{"issue":"2","key":"10.1016\/j.cie.2017.02.022_b0185","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0895-7177(93)90236-R","article-title":"Deterministic network interdiction","volume":"17","author":"Wood","year":"1993","journal-title":"Mathematical and Computer Modelling"},{"key":"10.1016\/j.cie.2017.02.022_b0190","series-title":"Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing","first-page":"46","article-title":"The feasibility of launching and detecting jamming attacks in wireless networks","author":"Xu","year":"2005"}],"container-title":["Computers &amp; Industrial Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0360835217300839?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0360835217300839?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,10,3]],"date-time":"2020-10-03T06:49:51Z","timestamp":1601707791000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0360835217300839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":38,"alternative-id":["S0360835217300839"],"URL":"https:\/\/doi.org\/10.1016\/j.cie.2017.02.022","relation":{},"ISSN":["0360-8352"],"issn-type":[{"type":"print","value":"0360-8352"}],"subject":[],"published":{"date-parts":[[2017,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Analyzing the robustness of an array of wireless access points to mobile jammers","name":"articletitle","label":"Article Title"},{"value":"Computers & Industrial Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cie.2017.02.022","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}