Locating jamming attackers in malicious wireless sensor networks | IEEE Conference Publication | IEEE Xplore