A Data Fusion Technique to Detect Wireless Network Virtual Jamming Attacks [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Wireless communications are potentially exposed to jamming due to the openness of the medium and, in ...
Aparicio-Navarro, Francisco J. +5 more
core +3 more sources
Irreversible Deposition of Line Segment Mixtures on a Square Lattice: Monte Carlo Study
We have studied kinetics of random sequential adsorption of mixtures on a square lattice using Monte Carlo method. Mixtures of linear short segments and long segments were deposited with the probability $p$ and $1-p$, respectively.
Bonnier B. +9 more
core +2 more sources
Exploring the jamming transition over a wide range of critical densities [PDF]
We numerically study the jamming transition of frictionless polydisperse spheres in three dimensions. We use an efficient thermalisation algorithm for the equilibrium hard sphere fluid and generate amorphous jammed packings over a range of critical ...
Berthier, Ludovic +2 more
core +5 more sources
Glassiness, Rigidity and Jamming of Frictionless Soft Core Disks
The jamming of bi-disperse soft core disks is considered, using a variety of different protocols to produce the jammed state. In agreement with other works, we find that cooling and compression can lead to a broad range of jamming packing fractions ...
Olsson, Peter +2 more
core +2 more sources
Packing structure of a two-dimensional granular system through the jamming transition
We have performed a novel experiment on granular packs composed of automatically swelling particles. By analyzing the Voronoi structure of packs going through the jamming transition, we show that the local configuration of a jamming pack is strikingly ...
Aharonov +20 more
core +1 more source
Jamming of packings of frictionless particles with and without shear
By minimizing the enthalpy of packings of frictionless particles, we obtain jammed solids at desired pressures and hence investigate the jamming transition with and without shear.
Xu, Ning, Zhang, Shiyun, Zheng, Wen
core +1 more source
Correlated Jamming in a Joint Source Channel Communication System
We study correlated jamming in joint source-channel communication systems. An i.i.d. source is to be communicated over a memoryless channel in the presence of a correlated jammer with non-causal knowledge of user transmission.
Budkuley, Amitalok J. +2 more
core +1 more source
Alibi framework for identifying reactive jamming nodes in wireless LAN [PDF]
Reactive jamming nodes are the nodes of the network that get compromised and become the source of jamming attacks. They assume to know any shared secrets and protocols used in the networks. Thus, they can jam very effectively and are very stealthy.
Nahrstedt, Klara +2 more
core
How Generic are the Robust Theoretical Aspects of Jamming in Hard Sphere Models?
In very recent work the mean field theory of the jamming transition in infinite dimensional hard spheres models was presented. Surprisingly, this theory predicts quantitatively numerically determined characteristics of jamming in two and three dimensions.
Parisi, Giorgio +4 more
core +1 more source
Critical jamming of frictional grains in the generalized isostaticity picture [PDF]
While frictionless spheres at jamming are isostatic, frictional spheres at jamming are not. As a result, frictional spheres near jamming do not necessarily exhibit an excess of soft modes.
Bell R. J. +11 more
core +3 more sources

