Hugh R Medal
Hugh R Medal
Assistant Professor, University of Tennessee
Verified email at utk.edu - Homepage
Title
Cited by
Cited by
Year
Jamming attacks on wireless networks: A taxonomic survey
S Vadlamani, B Eksioglu, H Medal, A Nandi
International Journal of Production Economics 172, 76-94, 2016
522016
Vulnerability assessment and re-routing of freight trains under disruptions: A coal supply chain network application
R Gedik, H Medal, C Rainwater, EA Pohl, SJ Mason
Transportation Research Part E: Logistics and Transportation Review 71, 45-57, 2014
502014
Botnet detection using graph-based feature clustering
S Chowdhury, M Khanzadeh, R Akula, F Zhang, S Zhang, H Medal, ...
Journal of Big Data 4 (1), 14, 2017
492017
Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender–attacker model
AK Nandi, HR Medal, S Vadlamani
Computers & Operations Research 75, 118-131, 2016
362016
Methods for removing links in a network to minimize the spread of infections
AK Nandi, HR Medal
Computers & Operations Research 69, 10-24, 2016
312016
Proactive cost-effective identification and mitigation of supply delay risks in a low volume high value supply chain using fault-tree analysis
MD Sherwin, H Medal, SA Lapp
International Journal of Production Economics 175, 153-163, 2016
262016
A multi-objective integrated facility location-hardening model: Analyzing the pre-and post-disruption tradeoff
HR Medal, EA Pohl, MD Rossetti
European Journal of Operational Research 237 (1), 257-270, 2014
252014
Robust facility location: Hedging against failures
I Hernandez, JE Ramirez-Marquez, C Rainwater, E Pohl, H Medal
Reliability Engineering & System Safety 123, 73-80, 2014
212014
Optimal traffic calming: A mixed-integer bi-level programming model for locating sidewalks and crosswalks in a multimodal transportation network to maximize pedestrians’ safety …
E Rashidi, M Parsafard, H Medal, X Li
Transportation research part E: logistics and transportation review 91, 33-50, 2016
162016
Allocating protection resources to facilities when the effect of protection is uncertain
HR Medal, EA Pohl, MD Rossetti
IIE Transactions 48 (3), 220-234, 2016
162016
Connected infrastructure location design under additive service utilities
X Li, H Medal, X Qu
Transportation Research Part B: Methodological 120, 99-124, 2019
132019
A model‐based systems engineering approach to critical infrastructure vulnerability assessment and decision analysis
J Huff, H Medal, K Griendling
Systems Engineering 22 (2), 114-133, 2019
112019
Minimizing expected maximum risk from cyber-attacks with probabilistic attack success
TH Bhuiyan, AK Nandi, H Medal, M Halappanavar
2016 IEEE Symposium on Technologies for Homeland Security (HST), 1-6, 2016
112016
Chapel hypergraph library (chgl)
L Jenkins, T Bhuiyan, S Harun, C Lightsey, D Mentgen, S Aksoy, ...
2018 IEEE high performance extreme computing conference (HPEC), 1-6, 2018
82018
The wireless network jamming problem subject to protocol interference
HR Medal
Networks 67 (2), 111-125, 2016
82016
A bi-level programming model for the wireless network jamming placement problem
S Vadlamani, H Medal, B Eksioglu, P Li
IIE Annual Conference. Proceedings, 1003, 2014
82014
A maximal covering location-based model for analyzing the vulnerability of landscapes to wildfires: Assessing the worst-case scenario
E Rashidi, H Medal, J Gordon, R Grala, M Varner
European journal of operational research 258 (3), 1095-1105, 2017
72017
Models for reducing the risk of critical networked infrastructures
H Medal, SJ Sharp, E Pohl, C Rainwater, SJ Mason
International Journal of Risk Assessment and Management 15 (2-3), 99-127, 2011
72011
A bi-objective analysis of the r-all-neighbor p-center problem
HR Medal, CE Rainwater, EA Pohl, MD Rossetti
Computers & Industrial Engineering 72, 114-128, 2014
62014
A software tool for intermittent demand analysis
HR Medal, MD Rossetti, VM Varghese, EA Pohl
IIE Annual Conference. Proceedings, 1658, 2009
62009
The system can't perform the operation now. Try again later.
Articles 1–20