{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:15:37Z","timestamp":1742390137434},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/wiopt.2008.4586066","type":"proceedings-article","created":{"date-parts":[[2008,8,6]],"date-time":"2008-08-06T20:13:51Z","timestamp":1218053631000},"page":"207-216","source":"Crossref","is-referenced-by-count":19,"title":["Linear programming models for jamming attacks on network traffic flows"],"prefix":"10.1109","author":[{"given":"Patrick","family":"Tague","sequence":"first","affiliation":[]},{"given":"David","family":"Slater","sequence":"additional","affiliation":[]},{"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[]},{"given":"Guevara","family":"Noubir","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Wireless Communications Principles and Practice","year":"2001","author":"rappaport","key":"3"},{"journal-title":"Modern Communication Jamming Principles and Techniques","year":"2004","author":"poisel","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511810817"},{"journal-title":"Security Engineering A Guide to Building Dependable Distributed Systems","year":"2001","author":"anderson","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.221"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"5","article-title":"intelligent jamming in wireless networks with applications to 802.11b and other networks","author":"thuente","year":"2006","journal-title":"Proc 25th IEEE Communications Society Military Communications Conference (MILCOM'06)"},{"key":"4","article-title":"802.11 denial-of-service attacks: real vulnerabilities and practical solutions","author":"bellardo","year":"2003","journal-title":"Proc Usenix Security Symposium"},{"journal-title":"Combinatorial Optimization Algorithms and Complexity","year":"1998","author":"papadimitriou","key":"9"},{"journal-title":"Network Flows Theory Algorithms and Applications","year":"1993","author":"ahuja","key":"8"},{"journal-title":"Introduction to Algorithms","year":"2000","author":"cormen","key":"11"}],"event":{"name":"2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops (WiOPT)","start":{"date-parts":[[2008,4,1]]},"location":"Berlin, Germany","end":{"date-parts":[[2008,4,3]]}},"container-title":["2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4568415\/4586016\/04586066.pdf?arnumber=4586066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T18:24:40Z","timestamp":1489688680000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4586066\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/wiopt.2008.4586066","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}