|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 238 occurrences of 149 keywords
|
|
|
Results
Found 3765 publication records. Showing 3765 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
137 | Lei Zhang 0025, Tongtong Li |
Spectrally Efficient Frequency Hopping System Design under Hostile Jamming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASA ![In: Wireless Algorithms, Systems, and Applications, 4th International Conference, WASA 2009, Boston, MA, USA, August 16-18, 2009. Proceedings, pp. 408-417, 2009, Springer, 978-3-642-03416-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
physical layer security, message-driven frequency hopping, Anti-jamming |
137 | Wenyuan Xu 0001, Wade Trappe, Yanyong Zhang, Timothy Wood 0001 |
The feasibility of launching and detecting jamming attacks in wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2005, Urbana-Champaign, IL, USA, May 25-27, 2005, pp. 46-57, 2005, ACM, 1-59593-004-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
jammer detection, denial of service, jamming |
125 | Hans Jonas Fossum Moen, Stein Kristoffersen |
Multi-resistant radar jamming using genetic algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008, pp. 1595-1602, 2008, ACM, 978-1-60558-130-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Digital RF Memory, constant false alarm rate, jamming technique design, multi-resistant optimization, pulse-doppler radar, genetic algorithm, multi-objective optimization |
119 | John P. McDermott, David M. Goldschlag |
Towards a model of storage jamming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Ninth IEEE Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland, pp. 176-, 1996, IEEE Computer Society, 0-8186-7522-5. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
storage jamming model, cryptographic techniques, detection mechanism, Unity logic, high-level operators, rate of jamming, persistent values, access control, access controls, cryptography, security of data, susceptibility |
113 | Clayton W. Commander, Panos M. Pardalos, Valeriy Ryabchenko, Oleg V. Shylo, Stan Uryasev, Grigoriy Zrazhevsky |
Jamming communication networks under complete uncertainty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Optim. Lett. ![In: Optim. Lett. 2(1), pp. 53-70, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Network interdiction, Network jamming, Optimization, Bounds |
113 | XueSong Wang, JianCheng Liu, Wenming Zhang, QiXiang Fu, Zhong Liu, XiaoXia Xie |
Mathematic principles of interrupted-sampling repeater jamming (ISRJ). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 50(1), pp. 113-123, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
interrupted-sampling, repeater jamming, ambiguity function, pulse compression, linear frequency modulated signal |
101 | Mario Strasser, Christina Pöpper, Srdjan Capkun |
Efficient uncoordinated FHSS anti-jamming communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2009, New Orleans, LA, USA, May 18-21, 2009, pp. 207-218, 2009, ACM, 978-1-60558-531-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wireless security, frequency hopping, anti-jamming |
95 | Jerry T. Chiang, Yih-Chun Hu |
Cross-layer jamming detection and mitigation in wireless broadcast networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, MOBICOM 2007, Montréal, Québec, Canada, September 9-14, 2007, pp. 346-349, 2007, ACM, 978-1-59593-681-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
key tree, CDMA, cross-layer, jamming, spread spectrum, anti-jamming |
95 | Sandeep Bhadra, Shreeshankar Bodas, Sanjay Shakkottai, Sriram Vishwanath |
Communication Through Jamming Over a Slotted ALOHA Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(11), pp. 5257-5262, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
95 | Daniel Meltz, Yizhar Or, Elon Rimon |
Experimental Verification and Graphical Characterization of Dynamic Jamming in Frictional Rigid-Body Mechanics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: 2007 IEEE International Conference on Robotics and Automation, ICRA 2007, 10-14 April 2007, Roma, Italy, pp. 580-585, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
95 | Anthony D. Wood, John A. Stankovic, Gang Zhou |
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECON ![In: Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2007, Merged with IEEE International Workshop on Wireless Ad-hoc and Sensor Networks (IWWAN), June 18-21, 2007, San Diego, California, USA, pp. 60-69, 2007, IEEE, 1-4244-1268-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
95 | Hung-Min Sun, Shih-Pu Hsu, Chien-Ming Chen 0001 |
Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 457-462, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
95 | Sherif M. Khattab, Daniel Mossé, Rami G. Melhem |
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
89 | Li-Der Jeng, Jen-Hou Huang, Chung-Hsuan Wang |
Performance of low-density parity-check coded FFH/BFSK systems under band multitone jamming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2007, Honolulu, Hawaii, USA, August 12-16, 2007, pp. 434-438, 2007, ACM, 978-1-59593-695-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
FFH/BFSK, band multitone jamming, LDPC |
83 | Leonard E. Lightfoot, Lei Zhang 0025, Jian Ren 0001, Tongtong Li |
Jamming-resilient subcarrier assignment for OFDMA based space-time coded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2009 IEEE International Conference on Electro/Information Technology, EIT 2009, Windsor, Ontario, Canada, June 7-9, 2009, pp. 260-265, 2009, IEEE, 978-1-4244-3355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
83 | Emrah Bayraktaroglu, Christopher King, Xin Liu, Guevara Noubir, Rajmohan Rajaraman, Bishal Thapa |
On the Performance of IEEE 802.11 under Jamming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 1265-1273, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
83 | Wenyuan Xu 0001, Ke Ma 0004, Wade Trappe, Yanyong Zhang |
Jamming sensor networks: attack and defense strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. ![In: IEEE Netw. 20(3), pp. 41-47, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
77 | Timothy X. Brown, Jesse E. James, Amita Sethi |
Jamming and sensing of encrypted wireless ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 7th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2006, Florence, Italy, May 22-25, 2006, pp. 120-130, 2006, ACM, 1-59593-368-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ad hoc networks, encryption, traffic analysis, sensing, jamming |
77 | Yee Wei Law, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga |
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005, pp. 76-88, 2005, ACM, 1-59593-227-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, clustering, MAC protocols, jamming, denial-of-service attacks |
77 | Vera P. Behar, Christo A. Kabakchiev, Lyubka Doukovska |
Adaptive CFAR PI Processor for Radar Target Detection in Pulse Jamming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. VLSI Signal Process. ![In: J. VLSI Signal Process. 26(3), pp. 383-396, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
CFAR API processor, detection in pulse jamming, target detection performance calculation, parallel algorithms, systolic architecture |
71 | John P. McDermott, R. Gelinas, S. Ornstein |
Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 265-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Doc, Wyatt, Virgil, storage jamming defense, storage jamming attack detection, replay defense, attack source determination, attack pattern determination, object-oriented data storage, application-specific techniques, access control, encryption, auditing, software prototyping, checksums, virus detection, prototype tools, logical replication, information warfare |
71 | Chi Chung Ko, Hung Nguyen-Le, Lei Huang |
ML-based follower jamming rejection in slow FH/MFSK systems with an antenna array. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 56(9), pp. 1536-1544, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
71 | Sherif M. Khattab, Daniel Mossé, Rami G. Melhem |
Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2008, July 21-25, 2008, Dublin, Ireland, 2008, ICST / ACM, 978-963-9799-27-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
71 | Wei Chen 0006, Danwei Chen, Guozi Sun, Yingzhou Zhang |
Defending Against Jamming Attacks in Wireless Local Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 519-528, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
71 | Koichi Ichige, Mitsuharu Imai, Hiroyuki Arai, Masayuki Nakano, Masafumi Hirono |
Direction of Arrival Detection System for Radio Surveillance: Frequency Spectrum Analysis of CDMA and Jamming Waves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 63rd IEEE Vehicular Technology Conference, VTC Spring 2006, 7-10 May 2006, Melbourne, Australia, pp. 2957-2961, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
71 | Chulho Won, Jong-Hoon Youn, Hesham H. Ali |
Impact of High-Mobility Radio Jamming in Large-Scale Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 244-251, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
65 | Ivan Martinovic, Paul Pichota, Jens B. Schmitt |
Jamming for good: a fresh approach to authentic communication in WSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 161-168, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, authentication, jamming |
65 | Wenyuan Xu 0001, Wade Trappe, Yanyong Zhang |
Anti-jamming timing channels for wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 203-213, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
jamming, timing channel, radio interference |
60 | Guevara Noubir, Guolong Lin |
Low-power DoS attacks in data wireless LANs and countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOBILE Mob. Comput. Commun. Rev. ![In: ACM SIGMOBILE Mob. Comput. Commun. Rev. 7(3), pp. 29-30, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
59 | Erik Steltz, Annan Mozeika, Nick Rodenberg, Eric Brown 0001, Heinrich M. Jaeger |
JSEL: Jamming Skin Enabled Locomotion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, October 11-15, 2009, St. Louis, MO, USA, pp. 5672-5677, 2009, IEEE, 978-1-4244-3803-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
59 | Jerry T. Chiang, Yih-Chun Hu |
Dynamic Jamming Mitigation for Wireless Broadcast Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 1211-1219, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
59 | Korporn Panyim, Prashant Krishnamurthy |
A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers, pp. 715-731, 2008, Springer / ICST, 978-3-642-03353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
59 | Wenyuan Xu |
On Adjusting Power to Defend Wireless Networks from Jamming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, USA, pp. 1-6, 2007, IEEE Computer Society, 978-1-4244-1024-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Ashwin Sampath, Hui Dai, Haitao Zheng 0001, Ben Y. Zhao |
Multi-channel Jamming Attacks using Cognitive Radios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 16th International Conference on Computer Communications and Networks, IEEE ICCCN 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007, pp. 352-357, 2007, IEEE, 978-1-4244-1251-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Jang-Wook Moon, John M. Shea, Tan F. Wong |
Collaborative mitigation of partial-time jamming on nonfading channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 5(6), pp. 1371-1381, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
59 | Jang-Wook Moon, Tan F. Wong, John M. Shea |
Pilot-Assisted and Blind Joint Data Detection and Channel Estimation in Partial-Time Jamming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 54(11), pp. 2092-2102, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
59 | Ivan Garvanov, Christo A. Kabakchiev, Plamen Daskalov |
Systolic Architecture of Adaptive Post Detection Integration CFAR Processor in Binomial Distribution Pulse Jamming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LSSC ![In: Large-Scale Scientific Computing, 4th International Conference, LSSC 2003, Sozopal, Bulgaria, June 4-8, 2003, Revised Papers, pp. 448-455, 2003, Springer, 3-540-21090-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
54 | Myung-Jin Chung, Jung-Su Han, Hyung-Jin Choi, Seok-Joong Kim |
An enhanced ECCM method using OFCDM in WiBro system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 499-503, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ECCM, IEEE 802.16e WiBro, OFCDM, jamming |
53 | Robert D. Miller, Wade Trappe |
Subverting MIMO wireless systems by jamming the channel estimation procedure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 19-24, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
denial of service, jamming, mimo |
53 | Loukas Lazos, Sisi Liu, Marwan Krunz |
Mitigating control-channel jamming attacks in multi-channel ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 169-180, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ad hoc networks, denial of service, multi channel, jamming, control channel |
53 | Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj |
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 64-78, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Wireless Security, Key Establishment, Frequency Hopping, Anti-jamming |
53 | Clayton W. Commander, Panos M. Pardalos, Valeriy Ryabchenko, Stan Uryasev, Grigoriy Zrazhevsky |
The wireless network jamming problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comb. Optim. ![In: J. Comb. Optim. 14(4), pp. 481-498, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Network interdiction, Percentile constraints, Integer programming, NP-hard, Jamming |
53 | Eitan Altman, Konstantin Avrachenkov, Andrey Garnaev |
A Jamming Game in Wireless Networks with Transmission Cost. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NET-COOP ![In: Network Control and Optimization, First EuroFGI International Conference, NET-COOP 2007, Avignon, France, June 5-7, 2007, Proceedings, pp. 1-12, 2007, Springer, 978-3-540-72708-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Non-zero-sum games, Wireless networks, Nash Equilibrium, Jamming, Water-filling |
53 | Li-Der Jeng, Shun-Sheng Lee, Chung-Hsuan Wang, Fang-Biau Ueng |
Low-density parity-check codes for FFH/BFSK systems with partial-band noise jamming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 1213-1218, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
FFH/BFSK, diversity combining, partial-band noise jamming, LDPC |
48 | Reza Nikjah, Norman C. Beaulieu |
On Antijamming in General CDMA Systems-Part II: Antijamming Performance of Coded Multicarrier Frequency-Hopping Spread Spectrum Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 7(3), pp. 888-897, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Kuzman Ganchev, Alex Kulesza, Jinsong Tan, Ryan Gabbard, Qian Liu, Michael J. Kearns |
Empirical Price Modeling for Sponsored Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINE ![In: Internet and Network Economics, Third International Workshop, WINE 2007, San Diego, CA, USA, December 12-14, 2007, Proceedings, pp. 541-548, 2007, Springer, 978-3-540-77104-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum |
Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 51-59, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran |
Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 9(8), pp. 1119-1133, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
jamming detection and mitigation, wireless multiple access, security, wireless sensor network, optimization, Jamming |
47 | Miroslav Pajic, Rahul Mangharam |
Anti-jamming for embedded wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 8th International Conference on Information Processing in Sensor Networks, IPSN 2009, April 13-16, 2009, San Francisco, California, USA, pp. 301-312, 2009, IEEE Computer Society, 978-1-4244-5108-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Abhinav Roongta, Jang-Wook Moon, John M. Shea |
Reliability-based hybrid ARQ as an adaptive response to jamming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 23(5), pp. 1045-1055, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Jie Zhang, Gang Wu, Xiaowei Yan |
Comparative Analysis of Sweeping Frequency Jamming and Non-sweeping Frequency Jamming in Partial-band Jamming Based on Projectile-carried Communication Jamming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCT ![In: 20th IEEE International Conference on Communication Technology, ICCT 2020, Nanning, China, October 28-31, 2020, pp. 379-383, 2020, IEEE, 978-1-7281-8141-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
42 | David Slater, Patrick Tague, Radha Poovendran, Brian J. Matt |
A coding-theoretic approach for efficient message verification over insecure channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 151-160, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
insecure channels, insertion attacks, message verification, jamming |
42 | Mario Cagalj, Srdjan Capkun, Jean-Pierre Hubaux |
Wormhole-Based Antijamming Techniques in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 6(1), pp. 100-114, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
jamming DoS attacks, security, simulations, Wireless sensor networks, probabilistic analysis, wormholes |
42 | Jin Myoung Kim, Tae Ho Cho |
Genetic Algorithm Based Routing Method for Efficient Data Transmission in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, Third International Conference on Intelligent Computing, ICIC 2007, Qingdao, China, August 21-24, 2007, Proceedings, pp. 273-282, 2007, Springer, 978-3-540-74170-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
radio-jamming zone, Genetic algorithm, sensor network, shortest path |
42 | Wenyuan Xu 0001, Timothy Wood 0001, Wade Trappe, Yanyong Zhang |
Channel surfing and spatial retreats: defenses against wireless denial of service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004, pp. 80-89, 2004, ACM, 1-58113-925-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
denial of service, Jamming, CSMA |
42 | Markus Breitbach, Hideki Imai |
On Channel Capacity and Modulation of Watermarks in Digital Still Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings, pp. 125-139, 1999, Springer, 3-540-66362-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Watermarking, Fingerprinting, Copyright protection, Modulation, Jamming, Channel Capacity |
42 | Hideki Imai |
Information Security Aspects of Spread Spectrum Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings, pp. 193-208, 1994, Springer, 3-540-59339-X. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Spread Spectrum System, Information Security, CDMA, Jamming, Cellular System, Untraceability |
41 | Yee Wei Law, Marimuthu Palaniswami, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga |
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Sens. Networks ![In: ACM Trans. Sens. Networks 5(1), pp. 6:1-6:38, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
clustering, MAC protocols, expectation maximization, jamming, denial-of-service attacks |
36 | Pramod Abichandani, Hande Y. Benson, Moshe Kam |
Multi-vehicle path coordination in support of communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: 2009 IEEE International Conference on Robotics and Automation, ICRA 2009, Kobe, Japan, May 12-17, 2009, pp. 3237-3244, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Shichuan Ma, Michael Hempel, Yaoqing (Lamar) Yang, Hamid Sharif |
An approach to secure wireless communications using randomized eigenvector-based jamming signals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 1172-1176, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
physical layer security, secrecy capacity |
35 | Annan Mozeika, Erik Steltz, Heinrich M. Jaeger |
The first steps of a robot based on jamming skin enabled locomotion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, October 11-15, 2009, St. Louis, MO, USA, pp. 408-409, 2009, IEEE, 978-1-4244-3803-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Maria Greco 0001, Fulvio Gini, Alfonso Farina |
Radar Detection and Classification of Jamming Signals Belonging to a Cone Class. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Signal Process. ![In: IEEE Trans. Signal Process. 56(5), pp. 1984-1993, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Patrick Tague, Sidharth Nabar, James A. Ritcey, David Slater, Radha Poovendran |
Throughput optimization for multipath unicast routing under probabilistic jamming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PIMRC ![In: Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, 15-18 September 2008, Cannes, French Riviera, France, pp. 1-5, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Jiliang Zhang 0003, Kah Chan Teh, Kwok Hung Li |
Rejection of Multitone Jamming for FFH/MFSK Spread-Spectrum Systems over Frequency-Selective Rayleigh-Fading Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 67th IEEE Vehicular Technology Conference, VTC Spring 2008, 11-14 May 2008, Singapore, pp. 688-692, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | H. X. Yang, F. M. Chen, Z. M. Li, Z. Q. Wu |
Study on the Engineering Factors of Jamming Effect of the Laser Blinding and Computer Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (4) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 4: Embedded Programming / Database Technology / Neural Networks and Applications / Other Applications, December 12-14, 2008, Wuhan, China, pp. 134-137, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Ghada Alnifie, Robert Simon |
A multi-channel defense against jamming attacks in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'07 - Proceedings of the Third ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece, October 22, 2007, pp. 95-104, 2007, ACM, 978-1-59593-806-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Wayne G. Phoel |
Iterative demodulation and decoding of frequency-hopped PSK in partial-band jamming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 23(5), pp. 1026-1033, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Guevara Noubir |
On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWIC ![In: Wired/Wireless Internet Communications, Second International Conference, WWIC 2004, Frankfurt/Oder, Germany, February 4-6, 2004, Proceedings, pp. 186-200, 2004, Springer, 3-540-20954-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Ivan Garvanov, Vera P. Behar, Christo A. Kabakchiev |
CFAR Processors in Pulse Jamming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Numerical Methods and Application ![In: Numerical Methods and Applications, 5th International Conference, NMA 2002, Borovets, Bulgaria, August 20-24, 2002, Revised Papers, pp. 291-298, 2002, Springer, 3-540-00608-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Yoshiki Kashimori, Satoru Inoue, Takeshi Kambara |
A neural mechanism of hyperaccurate detection of phase advance and delay in the jamming avoidance response of weakly electric fish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biol. Cybern. ![In: Biol. Cybern. 85(2), pp. 117-131, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Lin Chen 0002, Jean Leneutre |
Fight jamming with jamming - A game theoretic analysis of jamming attack in wireless networks and defense strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 55(9), pp. 2259-2270, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Eduard Garcia Villegas, Moisés Gómez, Elena López-Aguilera, Jordi Casademont |
Detecting and mitigating the impact of wideband jammers in IEEE 802.11 WLANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 57-61, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
resource management, jamming, IEEE 802.11 WLANs |
30 | Siddharth Maru, Timothy X. Brown |
Denial of service vulnerabilities in the 802.16 protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WICON ![In: Proceedings of the 4th Annual International Conference on Wireless Internet, WICON 2008, Maui, Hawaii, USA, November 17-19, 2008, pp. 37, 2008, ICST, 978-963-9799-36-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
encryption, denial of service, traffic analysis, IEEE 802.16, sensing, jamming, broadband wireless access |
30 | Jin Myoung Kim, Tae Ho Cho |
Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part III, pp. 637-648, 2007, Springer, 978-3-540-74482-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
radio-jamming zone, Genetic algorithm, sensor network, fuzzy logic, shortest path |
30 | S. Ananthi, R. Hariprakash, V. Vidya Devi, K. Padmanabhan |
Spread Spectrum Communication Using Wavelets of Signal for More Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICT/ICIW ![In: Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 19-25 February 2006, Guadeloupe, French Caribbean, pp. 87, 2006, IEEE Computer Society, 0-7695-2522-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Wavelet synthesis, Wavelet analysis, jamming, Spread spectrum |
29 | Kanghee Lee 0001, Tooran Emami, Yazan Ibdah, Yu Bi, Lun Li |
Cooperative Distributed MISO Wireless Relay Networks Under Jamming Environments with Power Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICSyN ![In: Third International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2011, Bali, Indonesia, 26-28 July, 2011, pp. 84-88, 2011, IEEE Computer Society, 978-1-4577-0975-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Amplify-and-forward, amplifying relay matrix, broadband noise jamming, minimum mean square error, power constraint |
29 | Qi Dong 0001, Donggang Liu |
Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 2010 International Conference on Distributed Computing Systems, ICDCS 2010, Genova, Italy, June 21-25, 2010, pp. 428-437, 2010, IEEE Computer Society, 978-0-7695-4059-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Jamming Attacks, Wireless Networks |
29 | Shui Cao, Xueguang Zhou, Yan Sun, Huanguo Zhang |
Research on Chinese Key Words Mining with Malicious Jamming in English. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFITA (3) ![In: International Forum on Information Technology and Applications, IFITA 2009, Chengdu, China, 15-17 May 2009, pp. 109-112, 2009, IEEE Computer Society, 978-0-7695-3600-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
keyword mining, malicious jamming in English, Chinese information processing, data base technology, network security |
29 | Sushil Kumar Jain, Kumkum Garg |
A Hybrid Model of Defense Techniques against Base Station Jamming Attack in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICSyN ![In: First International Conference on Computational Intelligence, Communication Systems and Networks, CICSYN 2009, Indore, India, 23-25 July, 2009, pp. 102-107, 2009, IEEE Computer Society, 978-0-7695-3743-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Jamming Attack, Denial of Service (DoS), Multipath Routing |
29 | Wenyuan Xu, Wade Trappe, Yanyong Zhang |
Channel surfing: defending wireless sensor networks from jamming and interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SenSys ![In: Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, SenSys 2006, Boulder, Colorado, USA, October 31 - November 3, 2006, pp. 403-404, 2006, ACM, 1-59593-343-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
channel surfing, jamming, radio interference |
29 | Hank Rausch |
Jamming Commercial Satellite Communications During Wartime: An Empirical Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 109-118, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
commercial satellite communications, hostile interference, jamming, denial of service attack |
29 | Hande Y. Benson, David F. Shanno, Robert J. Vanderbei |
Interior-point methods for nonconvex nonlinear programming: Jamming and numerical testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Program. ![In: Math. Program. 99(1), pp. 35-48, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
nonlinear programming, interior-point methods, jamming, nonconvex optimization |
24 | Rajgopal Kannan, Shuangqing Wei, Costas Busch, Athanasios V. Vasilakos |
Online Algorithms for Maximizing Quality of Link Transmissions over a Jammed Wireless Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: Seventh Annual IEEE International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2009), 9-13 March 2009, Galveston, TX, USA, pp. 1-6, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Hongbo Liu 0002, Wenyuan Xu 0001, Yingying Chen 0001, Zhenhua Liu 0005 |
Localizing Jammers in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: Seventh Annual IEEE International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2009), 9-13 March 2009, Galveston, TX, USA, pp. 1-6, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Eitan Altman, Konstantin Avrachenkov, Andrey Garnaev |
Alpha-Fair Resource Allocation under Incomplete Information and Presence of a Jammer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NET-COOP ![In: Network Control and Optimization, Third Euro-NF Conference, NET-COOP 2009, Eindhoven, The Netherlands, November 23-25, 2009, Proceedings, pp. 219-233, 2009, Springer, 978-3-642-10405-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Wireless networks, Power Control, Nash Equilibrium, Incomplete Information, Saddle Point |
24 | Andrew R. Brown, Steve Dillon, Thorin Kerr, Andrew Sorensen |
Evolving interactions: agile design for networked media performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OZCHI ![In: Proceedings of the 21st Australasian Computer-Human Interaction Conference, OZCHI 2009: Open 24/7, Melbourne, Australia, November 23-27, 2009, pp. 41-48, 2009, ACM, 978-1-60558-854-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Reza Nikjah, Norman C. Beaulieu |
On antijamming in general CDMA systems-part I: multiuser capacity analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 7(5-1), pp. 1646-1655, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Qing Zhao 0001, Bhaskar Krishnamachari, Keqin Liu |
On myopic sensing for multi-channel opportunistic access: structure, optimality, and performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 7(12-2), pp. 5431-5440, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Tara Javidi, Bhaskar Krishnamachari, Qing Zhao 0001, Mingyan Liu |
Optimality of Myopic Sensing in Multi-Channel Opportunistic Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 2107-2112, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Keqin Liu, Qing Zhao 0001 |
Link throughput of multi-channel opportunistic access with limited sensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2008, March 30 - April 4, 2008, Caesars Palace, Las Vegas, Nevada, USA, pp. 2997-3000, 2008, IEEE, 1-4244-1484-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Shahrokh Farahmand, Alfonso Cano, Georgios B. Giannakis |
Anti-jam distributed MIMO decoding using wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2008, March 30 - April 4, 2008, Caesars Palace, Las Vegas, Nevada, USA, pp. 2257-2260, 2008, IEEE, 1-4244-1484-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | M. M. Galib Asadullah, Gordon L. Stüber |
Joint EM Channel and Covariance Estimation with Sufficient-Statistic Chip Combining for a SIMO MC-CDMA Antijam System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pp. 1131-1136, 2008, IEEE, 978-1-4244-1997-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Wei Chen, Yingzhou Zhang, Yuanchun Wei |
The Feasibility of Launching Reduction of Quality (RoQ) Attacks in 802.11 Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 14th International Conference on Parallel and Distributed Systems, ICPADS 2008, Melbourne, Victoria, Australia, December 8-10, 2008, pp. 517-524, 2008, IEEE Computer Society, 978-0-7695-3434-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Ajmal S. Mian |
Realtime Visual Tracking of Aircrafts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DICTA ![In: Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, DICTA 2008, Canberra, ACT, Australia, 1-3 December 2008, pp. 351-356, 2008, IEEE Computer Society, 978-0-7695-3456-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Lie-Liang Yang |
Joint Transmitter-Receiver Design in TDD Multiuser MIMO Systems: An Egocentric/Altruistic Optimization Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 65th IEEE Vehicular Technology Conference, VTC Spring 2007, 22-25 April 2007, Dublin, Ireland, pp. 2094-2098, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Dino Schweitzer, Leemon C. Baird III, William L. Bahn |
Visually Understanding Jam Resistant Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007, pp. 175-186, 2007, Springer, 978-3-540-78242-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Umit Ayvaz, Murat Dere, Yao Ming Tiah |
Using the MANA agent-based simulation tool to evaluate and compare the effectiveness of ground-based and airborne communications jammers in countering the IED threat to ground convoys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim (2) ![In: Proceedings of the 2007 Spring Simulation Multiconference, SpringSim 2007, Norfolk, Virginia, USA, March 25-29, 2007, Volume 2, pp. 113-118, 2007, SCS/ACM, 1-56555-313-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
Counter-IED, MANA, communications jammers, nearly orthogonal Latin hypercube, IED |
24 | Garud Iyengar, David J. Phillips, Clifford Stein 0001 |
Models of malicious behavior in sponsored search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim (3) ![In: Proceedings of the 2007 Spring Simulation Multiconference, SpringSim 2007, Norfolk, Virginia, USA, March 25-29, 2007, Volume 3, pp. 143-151, 2007, SCS/ACM, 1-56555-314-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
approximation algorithms, sponsored search, auction theory |
24 | Chi Chung Ko, Hung Nguyen-Le, Lei Huang |
Joint Interference Suppression and Symbol Detection in Slow FH/MFSK Systems with an Antenna Array. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 63rd IEEE Vehicular Technology Conference, VTC Spring 2006, 7-10 May 2006, Melbourne, Australia, pp. 2691-2695, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | R. C. Chakinala, Abishek Kumarasubramanian, R. Manokaran, Guevara Noubir, C. Pandu Rangan, Ravi Sundaram |
Steganographic Communication in Ordered Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 42-57, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 3765 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|