{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T10:00:20Z","timestamp":1774173620977,"version":"3.50.1"},"reference-count":61,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.comnet.2026.112137","type":"journal-article","created":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T20:06:20Z","timestamp":1772309180000},"page":"112137","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Stochastic analysis of jammers for UAV-assisted C-V2X systems employing millimeter-wave 3D beamforming"],"prefix":"10.1016","volume":"280","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9687-1385","authenticated-orcid":false,"given":"Mohammad","family":"Arif","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2432-1357","authenticated-orcid":false,"given":"Khizar","family":"Abbas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8692-173X","authenticated-orcid":false,"given":"Adeel","family":"Iqbal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0955-3421","authenticated-orcid":false,"given":"Wooseong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2026.112137_bib0001","doi-asserted-by":"crossref","first-page":"42469","DOI":"10.1109\/ACCESS.2022.3168709","article-title":"Interference characterization in cellular-assisted vehicular communications with Jamming","volume":"10","author":"Arif","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2026.112137_bib0002","doi-asserted-by":"crossref","first-page":"182679","DOI":"10.1109\/ACCESS.2019.2960278","article-title":"Uplink interference management for HetNets stressed by clustered wide-band jammers","volume":"7","author":"Muhammad","year":"2019","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.comnet.2026.112137_bib0003","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/s11761-024-00396-w","article-title":"A detailed review of wireless sensor network, jammer, the types, location, detection and countermeasures of jammers","volume":"18","author":"Al-Husseini","year":"2024","journal-title":"Serv. Oriented Comput. Appl."},{"issue":"3","key":"10.1016\/j.comnet.2026.112137_bib0004","doi-asserted-by":"crossref","first-page":"576","DOI":"10.1109\/LCOMM.2016.2572085","article-title":"Modeling and analysis of small cells based on clustered stochastic geometry","volume":"21","author":"Wang","year":"2017","journal-title":"IEEE Commun. Lett."},{"issue":"9","key":"10.1016\/j.comnet.2026.112137_bib0005","doi-asserted-by":"crossref","first-page":"1538","DOI":"10.3390\/electronics9091538","article-title":"5G Cellular networks: coverage analysis in the presence of inter-cell interference and intentional jammers","volume":"9","author":"Qasim","year":"2020","journal-title":"Electronics"},{"key":"10.1016\/j.comnet.2026.112137_bib0006","doi-asserted-by":"crossref","DOI":"10.1016\/j.icte.2023.04.001","article-title":"Outage analysis for multi-radio heterogeneous networks in the presence of aerial jammers","author":"Haroon","year":"2023","journal-title":"ICT Express"},{"issue":"7","key":"10.1016\/j.comnet.2026.112137_bib0007","doi-asserted-by":"crossref","first-page":"4401","DOI":"10.1109\/TWC.2018.2824832","article-title":"Coverage analysis of a vehicular network modeled as Cox process driven by Poisson line process","volume":"17","author":"Chetlur","year":"2018","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"12","key":"10.1016\/j.comnet.2026.112137_bib0008","doi-asserted-by":"crossref","first-page":"2121","DOI":"10.1109\/LWC.2020.3014585","article-title":"On the load distribution of vehicular users modeled by a Poisson line Cox process","volume":"9","author":"Chetlur","year":"2020","journal-title":"IEEE Wireless Commun. Lett."},{"key":"10.1016\/j.comnet.2026.112137_bib0009","series-title":"Cellular-Assisted Vehicular Communications: A Stochastic Geometric Approach","author":"Guha","year":"2016"},{"issue":"10","key":"10.1016\/j.comnet.2026.112137_bib0010","first-page":"4950","article-title":"An analytical framework for coverage in cellular networks leveraging vehicles","volume":"66","author":"Choi","year":"2018","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/j.comnet.2026.112137_bib0011","article-title":"Study on LTE-Based V2X services (release 14)","author":"TR36.885","year":"2016","journal-title":"Tech. Specification Group Serv. Syst."},{"issue":"13","key":"10.1016\/j.comnet.2026.112137_bib0012","doi-asserted-by":"crossref","first-page":"11203","DOI":"10.1109\/JIOT.2021.3126651","article-title":"Joint communication and control for mmWave\/THz beam alignment in V2X networks","volume":"9","author":"Chang","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112137_bib0013","series-title":"2019 IEEE Global Communications Conference (GLOBECOM)","first-page":"1","article-title":"Analysis of intelligent vehicular relaying in urban 5G+ millimeter-wave cellular deployments","author":"Petrov","year":"2019"},{"issue":"1","key":"10.1016\/j.comnet.2026.112137_bib0014","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1109\/TVT.2022.3202369","article-title":"Distributed beam tracking for vehicular communications via UAV-assisted cellular network","volume":"72","author":"Jang","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"9","key":"10.1016\/j.comnet.2026.112137_bib0015","doi-asserted-by":"crossref","first-page":"8384","DOI":"10.1109\/TVT.2019.2911986","article-title":"Modeling and performance analysis of UAV-assisted vehicular networks","volume":"68","author":"Khabbaz","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2026.112137_bib0016","article-title":"Revolutionizing intelligent transportation systems with cellular vehicle-to-everything (C-V2X) technology: current trends, use cases, emerging technologies, standardization bodies, industry analytics and future directions","volume":"43","author":"Rammohan","year":"2023","journal-title":"Veh. Commun."},{"issue":"10","key":"10.1016\/j.comnet.2026.112137_bib0017","doi-asserted-by":"crossref","first-page":"600","DOI":"10.3390\/drones8100600","article-title":"Latency analysis of drone-Assisted C-V2X communications for basic safety and co-operative perception messages","volume":"8","author":"Gupta","year":"2024","journal-title":"Drones (2504-446X)"},{"issue":"1","key":"10.1016\/j.comnet.2026.112137_bib0018","doi-asserted-by":"crossref","first-page":"88","DOI":"10.23919\/JCC.fa.2023-0351.202401","article-title":"Building mmWave on the evolving C-V2X: mmWave NR-V2X","volume":"21","author":"Chen","year":"2024","journal-title":"China Commun."},{"issue":"4","key":"10.1016\/j.comnet.2026.112137_bib0019","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1007\/s41060-024-00537-6","article-title":"Decision making for selection of smart vehicle transportation system using VIKOR approach","volume":"19","author":"Khan","year":"2025","journal-title":"Int. J. Data Sci. Anal."},{"key":"10.1016\/j.comnet.2026.112137_bib0020","first-page":"1","article-title":"Fundamentals of vehicular communication networks with vehicle platoons","author":"Pandey","year":"2023","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.comnet.2026.112137_bib0021","doi-asserted-by":"crossref","DOI":"10.1016\/j.chb.2024.108394","article-title":"Ubiquitous computation in internet of vehicles for human-centric transport systems","volume":"161","author":"Ullah","year":"2024","journal-title":"Comput. Human Behav."},{"issue":"12","key":"10.1016\/j.comnet.2026.112137_bib0022","doi-asserted-by":"crossref","first-page":"11873","DOI":"10.1109\/TVT.2019.2945481","article-title":"Stochastic geometry modeling of cellular V2X communication over shared channels","volume":"68","author":"Sial","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2026.112137_bib0023","doi-asserted-by":"crossref","first-page":"7883","DOI":"10.1109\/ACCESS.2025.3526862","article-title":"Special vehicle classification algorithm-based system for dedicated parking zone violation detection in south korea","volume":"13","author":"Park","year":"2025","journal-title":"IEEE Access"},{"issue":"8","key":"10.1016\/j.comnet.2026.112137_bib0024","doi-asserted-by":"crossref","first-page":"8831","DOI":"10.1109\/TITS.2022.3219474","article-title":"CAMRL: a joint method of channel attention and multidimensional regression loss for 3D object detection in automated vehicles","volume":"24","author":"Gao","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"24","key":"10.1016\/j.comnet.2026.112137_bib0025","doi-asserted-by":"crossref","first-page":"3980","DOI":"10.3390\/math12243980","article-title":"Enhancing vehicle location prediction accuracy with road-aware rectification for multi-access edge computing applications","volume":"12","author":"Mehmood","year":"2024","journal-title":"Mathematics"},{"issue":"10","key":"10.1016\/j.comnet.2026.112137_bib0026","doi-asserted-by":"crossref","first-page":"2175","DOI":"10.1109\/LWC.2022.3196227","article-title":"Directional antennas modeling and coverage analysis of UAV-assisted networks","volume":"11","author":"Peng","year":"2022","journal-title":"IEEE Wireless Commun. Lett."},{"issue":"2","key":"10.1016\/j.comnet.2026.112137_bib0027","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/MVT.2020.2980438","article-title":"Enabling cellular communication for aerial vehicles: providing reliability for future applications","volume":"15","author":"de Amorim","year":"2020","journal-title":"IEEE Veh. Technol. Mag."},{"issue":"1","key":"10.1016\/j.comnet.2026.112137_bib0028","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MVT.2021.3136832","article-title":"Toward smart and secure V2X communication in 5G and beyond: a UAV-enabled aerial intelligent reflecting surface solution","volume":"17","author":"Cao","year":"2022","journal-title":"IEEE Veh. Technol. Mag."},{"key":"10.1016\/j.comnet.2026.112137_bib0029","doi-asserted-by":"crossref","DOI":"10.1016\/j.phycom.2023.102066","article-title":"Analysis of fluctuations of antenna pattern in U-V2X communications","volume":"58","author":"Arif","year":"2023","journal-title":"Phys. Commun."},{"key":"10.1016\/j.comnet.2026.112137_bib0030","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2022.109051","article-title":"Resource-efficient seamless transitions for high-performance multi-hop [UAV multicasting","volume":"213","author":"Tu","year":"2022","journal-title":"Comput. Netw."},{"issue":"23","key":"10.1016\/j.comnet.2026.112137_bib0031","doi-asserted-by":"crossref","first-page":"20574","DOI":"10.1109\/JIOT.2023.3291997","article-title":"Physical-layer jammer detection in multihop IoT networks","volume":"10","author":"Abdollahi","year":"2023","journal-title":"IEEE Internet Things J."},{"issue":"12","key":"10.1016\/j.comnet.2026.112137_bib0032","doi-asserted-by":"crossref","first-page":"11543","DOI":"10.1109\/TVT.2019.2940226","article-title":"Tractable optical channel modeling between UAVs","volume":"68","author":"Dabiri","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2026.112137_bib0033","article-title":"3D uplink channel modeling of UAV-based mmWave fronthaul links for future small cell networks","author":"Dabiri","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2026.112137_bib0034","doi-asserted-by":"crossref","DOI":"10.1109\/LWC.2022.3205730","article-title":"Pointing error modeling of mmWave to THz high-directional antenna arrays","author":"Dabiri","year":"2022","journal-title":"IEEE Wireless Commun. Lett."},{"issue":"6","key":"10.1016\/j.comnet.2026.112137_bib0035","doi-asserted-by":"crossref","first-page":"1115","DOI":"10.1016\/j.dcan.2022.09.007","article-title":"A robust beam tracking scheme for millimeter wave HetNets","volume":"8","author":"Xue","year":"2022","journal-title":"Digit. Commun. Netw."},{"key":"10.1016\/j.comnet.2026.112137_bib0036","series-title":"ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"8727","article-title":"Sensing-assisted beam tracking in V2I networks: extended target case","author":"Du","year":"2022"},{"issue":"8","key":"10.1016\/j.comnet.2026.112137_bib0037","doi-asserted-by":"crossref","first-page":"5417","DOI":"10.1109\/TCOMM.2022.3184158","article-title":"Anti-jamming beam alignment in millimeter-wave MIMO systems","volume":"70","author":"Darsena","year":"2022","journal-title":"IEEE Trans. Commun."},{"issue":"2","key":"10.1016\/j.comnet.2026.112137_bib0038","doi-asserted-by":"crossref","first-page":"2320","DOI":"10.1109\/TVT.2023.3320176","article-title":"Adaptive beam control considering location inaccuracy for anti-UAV systems","volume":"73","author":"Jin","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2026.112137_bib0039","doi-asserted-by":"crossref","first-page":"2271","DOI":"10.1109\/TSP.2025.3572503","article-title":"Dynamic transmit-receive beampattern optimization of colocated MIMO radars for multi-target tracking under suppression jamming","volume":"73","author":"Sun","year":"2025","journal-title":"IEEE Trans. Signal Process."},{"issue":"15","key":"10.1016\/j.comnet.2026.112137_bib0040","doi-asserted-by":"crossref","first-page":"3434","DOI":"10.3390\/math11153434","article-title":"Analysis of U-V2X communications with non-Clustered and clustered jamming in the presence of fluctuating UAV beam width","volume":"11","author":"Arif","year":"2023","journal-title":"Mathematics"},{"issue":"1","key":"10.1016\/j.comnet.2026.112137_bib0041","doi-asserted-by":"crossref","first-page":"1008","DOI":"10.1109\/JSYST.2022.3144159","article-title":"Learning-empowered resource allocation for air slicing in UAV-assisted cellular V2X communications","volume":"17","author":"Xu","year":"2022","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.comnet.2026.112137_bib0042","series-title":"GLOBECOM 2022-2022 IEEE Global Communications Conference","first-page":"2686","article-title":"Secure mmWave C-V2X communications using cooperative jamming","author":"Yang","year":"2022"},{"issue":"10","key":"10.1016\/j.comnet.2026.112137_bib0043","doi-asserted-by":"crossref","first-page":"14460","DOI":"10.1109\/TITS.2024.3394130","article-title":"Energy-efficient cooperative secure communications in mmwave vehicular networks using deep recurrent reinforcement learning","volume":"25","author":"Ju","year":"2024","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.comnet.2026.112137_bib0044","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110171","article-title":"Clustered jamming and antenna beam-width fluctuations for UAV-assisted cellular networks","volume":"240","author":"Arif","year":"2024","journal-title":"Comput. Netw."},{"issue":"12","key":"10.1016\/j.comnet.2026.112137_bib0045","doi-asserted-by":"crossref","first-page":"5643","DOI":"10.1109\/TWC.2019.2938168","article-title":"Coverage and rate analysis for vertical heterogeneous networks (VHetNets)","volume":"18","author":"Alzenad","year":"2019","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.comnet.2026.112137_bib0046","series-title":"Antenna Theory: Analysis and Design","author":"Balanis","year":"2015"},{"key":"10.1016\/j.comnet.2026.112137_bib0047","article-title":"Study on channel model for frequencies from 0.5 to 100 GHz (release 17)","author":"V14.1.1","year":"2017","journal-title":"Tech. Specification Group Radio Access Netw."},{"issue":"11","key":"10.1016\/j.comnet.2026.112137_bib0048","doi-asserted-by":"crossref","first-page":"3122","DOI":"10.1109\/TCOMM.2011.100411.100541","article-title":"A tractable approach to coverage and rate in cellular networks","volume":"59","author":"Andrews","year":"2011","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/j.comnet.2026.112137_bib0049","unstructured":"J.G. Andrews, A.K. Gupta, H.S. Dhillon, A primer on cellular network analysis using stochastic geometry, (2016). 10.48550\/arXiv.1604.03183."},{"key":"10.1016\/j.comnet.2026.112137_bib0050","series-title":"Proc. of IEEE Globecom Workshops (IGCW)","first-page":"1","article-title":"Coverage and rate analysis for unmanned aerial vehicle base stations with LoS\/NLoS propagation","author":"Alzenad","year":"2018"},{"key":"10.1016\/j.comnet.2026.112137_bib0051","series-title":"Stochastic Geometry and Its Applications","author":"Chiu","year":"2013"},{"key":"10.1016\/j.comnet.2026.112137_bib0052","series-title":"IEEE INFOCOM 2022-IEEE Conference on Computer Communications","first-page":"1629","article-title":"Vehicle-to-nothing? Securing C-V2X against protocol-aware DoS attacks","author":"Twardokus","year":"2022"},{"key":"10.1016\/j.comnet.2026.112137_bib0053","article-title":"Jamming attack in vehicular networks: adaptively probabilistic channel surfing scheme","volume":"1","author":"Giang","year":"2022","journal-title":"Wirel. Commun. Mobile Comput."},{"issue":"1","key":"10.1016\/j.comnet.2026.112137_bib0054","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1109\/TIFS.2011.2165948","article-title":"Jamming-resistant collaborative broadcast using uncoordinated frequency hopping","volume":"7","author":"Xiao","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"19","key":"10.1016\/j.comnet.2026.112137_bib0055","doi-asserted-by":"crossref","first-page":"9863","DOI":"10.3390\/app12199863","article-title":"Jam mitigation for autonomous convoys via behavior-based robotics","volume":"12","author":"Cheung","year":"2022","journal-title":"Appl. Sci."},{"issue":"7","key":"10.1016\/j.comnet.2026.112137_bib0056","doi-asserted-by":"crossref","first-page":"1486","DOI":"10.1109\/TIFS.2016.2535906","article-title":"Jamming resilient communication using MIMO interference cancellation","volume":"11","author":"Yan","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"10.1016\/j.comnet.2026.112137_bib0057","doi-asserted-by":"crossref","first-page":"1208","DOI":"10.1109\/TNET.2011.2106139","article-title":"A measurement-driven anti-jamming system for 802.11 networks","volume":"19","author":"Pelechrinis","year":"2011","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"10.1016\/j.comnet.2026.112137_bib0058","series-title":"Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies","first-page":"181","article-title":"Ares: an anti-jamming reinforcement system for 802.11 networks","author":"Pelechrinis","year":"2009"},{"issue":"9","key":"10.1016\/j.comnet.2026.112137_bib0059","doi-asserted-by":"crossref","first-page":"4067","DOI":"10.1109\/TIT.2009.2025543","article-title":"Interference and outage in clustered wireless Ad Hoc networks","volume":"55","author":"Ganti","year":"2009","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"10.1016\/j.comnet.2026.112137_bib0060","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1109\/TIT.2005.862098","article-title":"An Aloha protocol for multihop mobile wireless networks","volume":"52","author":"Baccelli","year":"2006","journal-title":"IEEE Trans. Inf. Theory"},{"key":"10.1016\/j.comnet.2026.112137_bib0061","series-title":"2018 IEEE International Conference on Communications Workshops (ICC Workshops)","first-page":"1","article-title":"Modeling and performance analysis of UAV-assisted cellular networks in isolated regions","author":"Wang","year":"2018"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626001490?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626001490?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T09:44:18Z","timestamp":1774172658000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128626001490"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":61,"alternative-id":["S1389128626001490"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112137","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Stochastic analysis of jammers for UAV-assisted C-V2X systems employing millimeter-wave 3D beamforming","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112137","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"112137"}}