Jamming Attack Case Studies