Follow
APURBA K NANDI
Title
Cited by
Cited by
Year
Jamming attacks on wireless networks: A taxonomic survey
S Vadlamani, B Eksioglu, H Medal, A Nandi
International Journal of Production Economics 172, 76-94, 2016
1462016
Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender–attacker model
AK Nandi, HR Medal, S Vadlamani
Computers & Operations Research 75, 118-131, 2016
762016
Methods for removing links in a network to minimize the spread of infections
AK Nandi, HR Medal
Computers & Operations Research 69, 10-24, 2016
692016
Driver behavior and accident frequency in school zones: Assessing the impact of sign saturation
L Strawderman, MM Rahman, Y Huang, A Nandi
Accident Analysis & Prevention 82, 118-125, 2015
412015
Minimizing expected maximum risk from cyber-attacks with probabilistic attack success
TH Bhuiyan, AK Nandi, H Medal, M Halappanavar
2016 IEEE Symposium on Technologies for Homeland Security (HST), 1-6, 2016
232016
Risk-Averse Bi-Level Stochastic Network Interdiction Model for Cyber-Security Risk Management
TH Bhuiyan, HR Medal, AK Nandi, M Halappanavar
International Journal of Critical Infrastructure Protection, 100408, 2021
172021
Accelerating the mining of influential nodes in complex networks through community detection
M Halappanavar, AV Sathanur, AK Nandi
Proceedings of the ACM International Conference on Computing Frontiers, 64-71, 2016
142016
A mixed-integer programming approach for locating jamming devices in a flow-jamming attack
S Vadlamani, D Schweitzer, H Medal, A Nandi, B Eksioglu
Computers & Operations Research 95, 83-96, 2018
72018
Network interdiction models and algorithms for information security
AK Nandi
Mississippi State University, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–9