The following publications are possibly variants of this publication:
- Optimal transmission strategy for sensors to defend against eavesdropping and jamming attacksLi Yuan, Kun Wang, Toshiaki Miyazaki, Song Guo, Meng Wu. icc 2017: 1-6 [doi]
- Defending Against Jamming Attacks in Wireless Local Area NetworksWei Chen, Danwei Chen, Guozi Sun, Yingzhou Zhang. ATC 2007: 519-528 [doi]
- You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum SharingHaojin Zhu, Chenliaohui Fang, Yao Liu, Cailian Chen, Mengyuan Li, Xuemin Sherman Shen. jsac, 34(10):2723-2737, 2016. [doi]