Hugh R Medal
Hugh R Medal
Assistant Professor, University of Tennessee
Verified email at - Homepage
Cited by
Cited by
Jamming attacks on wireless networks: A taxonomic survey
S Vadlamani, B Eksioglu, H Medal, A Nandi
International Journal of Production Economics 172, 76-94, 2016
Vulnerability assessment and re-routing of freight trains under disruptions: A coal supply chain network application
R Gedik, H Medal, C Rainwater, EA Pohl, SJ Mason
Transportation Research Part E: Logistics and Transportation Review 71, 45-57, 2014
Botnet detection using graph-based feature clustering
S Chowdhury, M Khanzadeh, R Akula, F Zhang, S Zhang, H Medal, ...
Journal of Big Data 4 (1), 14, 2017
Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender–attacker model
AK Nandi, HR Medal, S Vadlamani
Computers & Operations Research 75, 118-131, 2016
Methods for removing links in a network to minimize the spread of infections
AK Nandi, HR Medal
Computers & Operations Research 69, 10-24, 2016
Proactive cost-effective identification and mitigation of supply delay risks in a low volume high value supply chain using fault-tree analysis
MD Sherwin, H Medal, SA Lapp
International Journal of Production Economics 175, 153-163, 2016
A multi-objective integrated facility location-hardening model: Analyzing the pre-and post-disruption tradeoff
HR Medal, EA Pohl, MD Rossetti
European Journal of Operational Research 237 (1), 257-270, 2014
Robust facility location: Hedging against failures
I Hernandez, JE Ramirez-Marquez, C Rainwater, E Pohl, H Medal
Reliability Engineering & System Safety 123, 73-80, 2014
Optimal traffic calming: A mixed-integer bi-level programming model for locating sidewalks and crosswalks in a multimodal transportation network to maximize pedestrians’ safety …
E Rashidi, M Parsafard, H Medal, X Li
Transportation research part E: logistics and transportation review 91, 33-50, 2016
Allocating protection resources to facilities when the effect of protection is uncertain
HR Medal, EA Pohl, MD Rossetti
IIE Transactions 48 (3), 220-234, 2016
Connected infrastructure location design under additive service utilities
X Li, H Medal, X Qu
Transportation Research Part B: Methodological 120, 99-124, 2019
A model‐based systems engineering approach to critical infrastructure vulnerability assessment and decision analysis
J Huff, H Medal, K Griendling
Systems Engineering 22 (2), 114-133, 2019
Minimizing expected maximum risk from cyber-attacks with probabilistic attack success
TH Bhuiyan, AK Nandi, H Medal, M Halappanavar
2016 IEEE Symposium on Technologies for Homeland Security (HST), 1-6, 2016
Chapel hypergraph library (chgl)
L Jenkins, T Bhuiyan, S Harun, C Lightsey, D Mentgen, S Aksoy, ...
2018 IEEE high performance extreme computing conference (HPEC), 1-6, 2018
The wireless network jamming problem subject to protocol interference
HR Medal
Networks 67 (2), 111-125, 2016
A bi-level programming model for the wireless network jamming placement problem
S Vadlamani, H Medal, B Eksioglu, P Li
IIE Annual Conference. Proceedings, 1003, 2014
A maximal covering location-based model for analyzing the vulnerability of landscapes to wildfires: Assessing the worst-case scenario
E Rashidi, H Medal, J Gordon, R Grala, M Varner
European journal of operational research 258 (3), 1095-1105, 2017
Models for reducing the risk of critical networked infrastructures
H Medal, SJ Sharp, E Pohl, C Rainwater, SJ Mason
International Journal of Risk Assessment and Management 15 (2-3), 99-127, 2011
A bi-objective analysis of the r-all-neighbor p-center problem
HR Medal, CE Rainwater, EA Pohl, MD Rossetti
Computers & Industrial Engineering 72, 114-128, 2014
A software tool for intermittent demand analysis
HR Medal, MD Rossetti, VM Varghese, EA Pohl
IIE Annual Conference. Proceedings, 1658, 2009
The system can't perform the operation now. Try again later.
Articles 1–20