Hugh R Medal
TitleCited byYear
Vulnerability assessment and re-routing of freight trains under disruptions: A coal supply chain network application
R Gedik, H Medal, C Rainwater, EA Pohl, SJ Mason
Transportation Research Part E: Logistics and Transportation Review 71, 45-57, 2014
422014
Jamming attacks on wireless networks: A taxonomic survey
S Vadlamani, B Eksioglu, H Medal, A Nandi
International Journal of Production Economics 172, 76-94, 2016
372016
Botnet detection using graph-based feature clustering
S Chowdhury, M Khanzadeh, R Akula, F Zhang, S Zhang, H Medal, ...
Journal of Big Data 4 (1), 14, 2017
312017
Methods for removing links in a network to minimize the spread of infections
AK Nandi, HR Medal
Computers & Operations Research 69, 10-24, 2016
252016
Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender–attacker model
AK Nandi, HR Medal, S Vadlamani
Computers & Operations Research 75, 118-131, 2016
242016
Proactive cost-effective identification and mitigation of supply delay risks in a low volume high value supply chain using fault-tree analysis
MD Sherwin, H Medal, SA Lapp
International Journal of Production Economics 175, 153-163, 2016
202016
A multi-objective integrated facility location-hardening model: Analyzing the pre-and post-disruption tradeoff
HR Medal, EA Pohl, MD Rossetti
European Journal of Operational Research 237 (1), 257-270, 2014
202014
Robust facility location: Hedging against failures
I Hernandez, JE Ramirez-Marquez, C Rainwater, E Pohl, H Medal
Reliability Engineering & System Safety 123, 73-80, 2014
172014
Optimal traffic calming: A mixed-integer bi-level programming model for locating sidewalks and crosswalks in a multimodal transportation network to maximize pedestrians’ safety …
E Rashidi, M Parsafard, H Medal, X Li
Transportation research part E: logistics and transportation review 91, 33-50, 2016
142016
Allocating protection resources to facilities when the effect of protection is uncertain
HR Medal, EA Pohl, MD Rossetti
IIE Transactions 48 (3), 220-234, 2016
132016
A bi-level programming model for the wireless network jamming placement problem
S Vadlamani, H Medal, B Eksioglu, P Li
IIE Annual Conference. Proceedings, 1003, 2014
82014
A maximal covering location-based model for analyzing the vulnerability of landscapes to wildfires: Assessing the worst-case scenario
E Rashidi, H Medal, J Gordon, R Grala, M Varner
European journal of operational research 258 (3), 1095-1105, 2017
72017
Minimizing expected maximum risk from cyber-attacks with probabilistic attack success
TH Bhuiyan, AK Nandi, H Medal, M Halappanavar
2016 IEEE Symposium on Technologies for Homeland Security (HST), 1-6, 2016
72016
A model‐based systems engineering approach to critical infrastructure vulnerability assessment and decision analysis
J Huff, H Medal, K Griendling
Systems Engineering 22 (2), 114-133, 2019
62019
The wireless network jamming problem subject to protocol interference
HR Medal
Networks 67 (2), 111-125, 2016
62016
A software tool for intermittent demand analysis
HR Medal, MD Rossetti, VM Varghese, EA Pohl
IIE Annual Conference. Proceedings, 1658, 2009
62009
Connected infrastructure location design under additive service utilities
X Li, H Medal, X Qu
Transportation Research Part B: Methodological 120, 99-124, 2019
52019
A Visual Evaluation Study of Graph Sampling Techniques
F Zhang, S Zhang, P Chung Wong, H Medal, L Bian, II Swan, J Edward, ...
Electronic Imaging 2017 (1), 110-117, 2017
52017
Security in Wireless Networks: A Tutorial.
S Vadlamani, HR Medal, B Eksioglu
Examining Robustness and Vulnerability of Networked Systems, 272-288, 2014
52014
A bi-objective analysis of the r-all-neighbor p-center problem
HR Medal, CE Rainwater, EA Pohl, MD Rossetti
Computers & Industrial Engineering 72, 114-128, 2014
52014
The system can't perform the operation now. Try again later.
Articles 1–20