{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T04:40:40Z","timestamp":1770439240762,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/globalsip.2014.7032250","type":"proceedings-article","created":{"date-parts":[[2015,2,11]],"date-time":"2015-02-11T17:25:53Z","timestamp":1423675553000},"page":"900-904","source":"Crossref","is-referenced-by-count":4,"title":["Analyzing wireless communication network vulnerability with homological invariants"],"prefix":"10.1109","author":[{"given":"Michael","family":"Robinson","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/938990.938993"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.05991"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887322"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.107.195701"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.85.016112"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.85.046109"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1038\/nphys2727"},{"key":"ref17","first-page":"335","article-title":"Blind swarms for coverage in 2-d","author":"de silva","year":"2005","journal-title":"Robotics Science and Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440933"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2140\/agt.2007.7.339"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s00454-013-9529-6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2008.08.016"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00454-006-1276-5"},{"key":"ref3","first-page":"1","article-title":"Design of network topology in an adversarial environment","author":"assane","year":"2010","journal-title":"Decision and Game Theory for Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2011.02.016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"ref8","first-page":"87","article-title":"Achieving mac layer fairness in wireless packet networks","author":"nandagopal","year":"2002","journal-title":"Proc ACM MobiCom"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1109\/TNET.2011.2170849","article-title":"On new approaches of assessing network vulnerability: hardness and approximation","volume":"20","author":"thang","year":"2012","journal-title":"Networking IEEE\/ACM Transactions on"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1007\/978-3-540-24643-5_17","article-title":"On connectivity in ad hoc networks under jamming using directional antennas and mobility","author":"noubir","year":"2004","journal-title":"Wired\/Wireless Internet Communications"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513809"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10878-007-9071-7"},{"key":"ref20","first-page":"452","article-title":"Detecting coverage holes in wireless sensor networks","author":"jinko","year":"2009","journal-title":"Control and Automation 2009 MED '09 17th Mediterranean Conference on"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1637931"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1072989.1072992"},{"key":"ref24","author":"hatcher","year":"2002","journal-title":"Algebraic Topology"},{"key":"ref23","first-page":"73520v-73520v","article-title":"Decentralized detection and patching of coverage holes in wireless sensor networks","author":"yao","year":"2009","journal-title":"SPIE Defense Security and Sensing"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1090\/S0273-0979-07-01191-3"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s00454-002-2885-2"}],"event":{"name":"2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","location":"Atlanta, GA, USA","start":{"date-parts":[[2014,12,3]]},"end":{"date-parts":[[2014,12,5]]}},"container-title":["2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7010655\/7032060\/07032250.pdf?arnumber=7032250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T01:22:23Z","timestamp":1498180943000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7032250\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/globalsip.2014.7032250","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}