Hugh R Medal
Hugh R Medal
Assistant Professor, University of Tennessee
Verified email at utk.edu - Homepage
Title
Cited by
Cited by
Year
Jamming attacks on wireless networks: A taxonomic survey
S Vadlamani, B Eksioglu, H Medal, A Nandi
International Journal of Production Economics 172, 76-94, 2016
592016
Botnet detection using graph-based feature clustering
S Chowdhury, M Khanzadeh, R Akula, F Zhang, S Zhang, H Medal, ...
Journal of Big Data 4 (1), 14, 2017
532017
Vulnerability assessment and re-routing of freight trains under disruptions: A coal supply chain network application
R Gedik, H Medal, C Rainwater, EA Pohl, SJ Mason
Transportation Research Part E: Logistics and Transportation Review 71, 45-57, 2014
532014
Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender–attacker model
AK Nandi, HR Medal, S Vadlamani
Computers & Operations Research 75, 118-131, 2016
392016
Methods for removing links in a network to minimize the spread of infections
AK Nandi, HR Medal
Computers & Operations Research 69, 10-24, 2016
312016
Proactive cost-effective identification and mitigation of supply delay risks in a low volume high value supply chain using fault-tree analysis
MD Sherwin, H Medal, SA Lapp
International Journal of Production Economics 175, 153-163, 2016
262016
A multi-objective integrated facility location-hardening model: Analyzing the pre-and post-disruption tradeoff
HR Medal, EA Pohl, MD Rossetti
European Journal of Operational Research 237 (1), 257-270, 2014
252014
Robust facility location: Hedging against failures
I Hernandez, JE Ramirez-Marquez, C Rainwater, E Pohl, H Medal
Reliability Engineering & System Safety 123, 73-80, 2014
212014
Optimal traffic calming: A mixed-integer bi-level programming model for locating sidewalks and crosswalks in a multimodal transportation network to maximize pedestrians’ safety …
E Rashidi, M Parsafard, H Medal, X Li
Transportation research part E: logistics and transportation review 91, 33-50, 2016
162016
Allocating protection resources to facilities when the effect of protection is uncertain
HR Medal, EA Pohl, MD Rossetti
IIE Transactions 48 (3), 220-234, 2016
162016
Connected infrastructure location design under additive service utilities
X Li, H Medal, X Qu
Transportation Research Part B: Methodological 120, 99-124, 2019
152019
A model‐based systems engineering approach to critical infrastructure vulnerability assessment and decision analysis
J Huff, H Medal, K Griendling
Systems Engineering 22 (2), 114-133, 2019
122019
Minimizing expected maximum risk from cyber-attacks with probabilistic attack success
TH Bhuiyan, AK Nandi, H Medal, M Halappanavar
2016 IEEE Symposium on Technologies for Homeland Security (HST), 1-6, 2016
112016
Chapel hypergraph library (chgl)
L Jenkins, T Bhuiyan, S Harun, C Lightsey, D Mentgen, S Aksoy, ...
2018 IEEE high performance extreme computing conference (HPEC), 1-6, 2018
82018
A maximal covering location-based model for analyzing the vulnerability of landscapes to wildfires: Assessing the worst-case scenario
E Rashidi, H Medal, J Gordon, R Grala, M Varner
European journal of operational research 258 (3), 1095-1105, 2017
82017
The wireless network jamming problem subject to protocol interference
HR Medal
Networks 67 (2), 111-125, 2016
82016
A bi-level programming model for the wireless network jamming placement problem
S Vadlamani, H Medal, B Eksioglu, P Li
IIE Annual Conference. Proceedings, 1003, 2014
82014
Models for reducing the risk of critical networked infrastructures
H Medal, SJ Sharp, E Pohl, C Rainwater, SJ Mason
International Journal of Risk Assessment and Management 15 (2-3), 99-127, 2011
72011
A Visual Evaluation Study of Graph Sampling Techniques
F Zhang, S Zhang, P Chung Wong, H Medal, L Bian, JE Swan II, ...
Electronic Imaging 2017 (1), 110-117, 2017
62017
A bi-objective analysis of the r-all-neighbor p-center problem
HR Medal, CE Rainwater, EA Pohl, MD Rossetti
Computers & Industrial Engineering 72, 114-128, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20