“…Due to the topic's importance, wireless network jamming has been extensively studied in the applied research fields [1, 5, 6, 22, 26-28, 30, 31, 39, 41-43], both from the attacker's perspective [6,26,27,43] as well as from the defender's perspective [1,5,6,27,28,30,41,43]-also in multi-hop settings (e.g. [21,32,[45][46][47]).…”