[引用][C] Planman structure-a strategy for compromise

LJ McKell, JW Jenkins - Expert Systems Review, 1989 - dl.acm.org
Planman structure-a strategy for compromise | Expert Systems Review skip to main content
ACM Digital Library home ACM home Google, Inc. (search) Advanced Search Browse About …

Fight jamming with jamming–A game theoretic analysis of jamming attack in wireless networks and defense strategy

L Chen, J Leneutre - Computer Networks, 2011 - Elsevier
In wireless networks, jamming is an easily mountable attack with detrimental effects on the
victim network. Existing defense strategies mainly consist of retreating from the jammer or …

[PDF][PDF] On classifying and evaluating the effect of jamming attacks

YS Kim, H Lee - The 24th edition of the International Conference on …, 2010 - ccs.korea.ac.kr
While various wireless networks have advanced rapidly and become an indispensable
infrastructure in our network environment, jamming attacks are the common challenging …

[PDF][PDF] Survey on survival approaches in wireless network against jamming attack

F Ahsan, A Zahir, S Mohsin, K Hussain - Journal of Theoretical and Applied …, 2011 - jatit.org
Wireless networks are more depicted to intentional or unintentional threats than their wired
based equivalent networks. Major reason being the wireless medium which can be listened …

[PDF][PDF] Survey on jamming wireless networks: Attacks and prevention strategies

SR Ratna, R Ravi - International Journal of Computer and Information …, 2015 - academia.edu
Wireless networks are built upon the open shared medium which makes easy for attackers
to conduct malicious activities. Jamming is one of the most serious security threats to …

[PDF][PDF] A Survey on the Defense Mechanisms of Jamming Attacks in Wireless Networks

T Ramesh, SS Meenatchi - INTERNATIONAL JOURNAL OF …, 2013 - academia.edu
Wireless Networks is the most vital and emerging technology. It contains lots of sensor
nodes comprised in it. This provides us global and local views. It has a numerous potential …

On a new type of denial of service attack in wireless networks: The distributed jammer network

H Huang, N Ahmed, P Karthik - IEEE Transactions on Wireless …, 2011 - ieeexplore.ieee.org
In this paper, we introduce a new type of denial of service attack to wireless networks:
distributed jammer network (DJN), which is made of a large number of low-power, tiny radio …

Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks

S Misra, SK Dhurandher, A Rayankula… - Computers & electrical …, 2010 - Elsevier
The advent of wireless networks has brought a new set of security issues with it. One of the
most feared of these is the jamming-based attacks. In this paper, we propose a pre-emptive …

Jamming and anti–jamming techniques in wireless networks: a survey

K Grover, A Lim, Q Yang - International Journal of Ad Hoc …, 2014 - inderscienceonline.com
Because of the proliferation of wireless technologies, jamming in wireless networks has
become a major research problem due to the ease in blocking communication in wireless …

[PDF][PDF] Anti-jamming: a study

K Mahadevan, S Hong, J Dullum - 2005 - Citeseer
Addressing jamming in wireless networks is important as the number of wireless networks is
on the increase. In this paper, we present a new mechanism to mitigate jamming attacks. We …