Hugh R Medal
Hugh R Medal
Assistant Professor, University of Tennessee
Verified email at - Homepage
Cited by
Cited by
Botnet detection using graph-based feature clustering
S Chowdhury, M Khanzadeh, R Akula, F Zhang, S Zhang, H Medal, ...
Journal of Big Data 4, 1-23, 2017
Jamming attacks on wireless networks: A taxonomic survey
S Vadlamani, B Eksioglu, H Medal, A Nandi
International Journal of Production Economics 172, 76-94, 2016
Vulnerability assessment and re-routing of freight trains under disruptions: A coal supply chain network application
R Gedik, H Medal, C Rainwater, EA Pohl, SJ Mason
Transportation Research Part E: Logistics and Transportation Review 71, 45-57, 2014
Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender–attacker model
AK Nandi, HR Medal, S Vadlamani
Computers & Operations Research 75, 118-131, 2016
Methods for removing links in a network to minimize the spread of infections
AK Nandi, HR Medal
Computers & Operations Research 69, 10-24, 2016
Proactive cost-effective identification and mitigation of supply delay risks in a low volume high value supply chain using fault-tree analysis
MD Sherwin, H Medal, SA Lapp
International Journal of Production Economics 175, 153-163, 2016
Robust facility location: Hedging against failures
I Hernandez, JE Ramirez-Marquez, C Rainwater, E Pohl, H Medal
Reliability Engineering & System Safety 123, 73-80, 2014
A multi-objective integrated facility location-hardening model: Analyzing the pre-and post-disruption tradeoff
HR Medal, EA Pohl, MD Rossetti
European Journal of Operational Research 237 (1), 257-270, 2014
A stochastic programming model with endogenous and exogenous uncertainty for reliable network design under random disruption
TH Bhuiyan, HR Medal, S Harun
European Journal of Operational Research 285 (2), 670-694, 2020
A model‐based systems engineering approach to critical infrastructure vulnerability assessment and decision analysis
J Huff, H Medal, K Griendling
Systems Engineering 22 (2), 114-133, 2019
Connected infrastructure location design under additive service utilities
X Li, H Medal, X Qu
Transportation Research Part B: Methodological 120, 99-124, 2019
Optimal traffic calming: A mixed-integer bi-level programming model for locating sidewalks and crosswalks in a multimodal transportation network to maximize pedestrians’ safety …
E Rashidi, M Parsafard, H Medal, X Li
Transportation research part E: logistics and transportation review 91, 33-50, 2016
Allocating protection resources to facilities when the effect of protection is uncertain
HR Medal, EA Pohl, MD Rossetti
IIE Transactions 48 (3), 220-234, 2016
Minimizing expected maximum risk from cyber-attacks with probabilistic attack success
TH Bhuiyan, AK Nandi, H Medal, M Halappanavar
2016 IEEE Symposium on Technologies for Homeland Security (HST), 1-6, 2016
Identifying and mitigating supply chain risks using fault tree optimization
MD Sherwin, HR Medal, CA MacKenzie, KJ Brown
IISE Transactions 52 (2), 236-254, 2020
Chapel hypergraph library (chgl)
L Jenkins, T Bhuiyan, S Harun, C Lightsey, D Mentgen, S Aksoy, ...
2018 IEEE high performance extreme computing conference (HPEC), 1-6, 2018
A maximal covering location-based model for analyzing the vulnerability of landscapes to wildfires: Assessing the worst-case scenario
E Rashidi, H Medal, J Gordon, R Grala, M Varner
European journal of operational research 258 (3), 1095-1105, 2017
A bi-level programming model for the wireless network jamming placement problem
S Vadlamani, H Medal, B Eksioglu, P Li
IIE Annual Conference. Proceedings, 1003, 2014
The wireless network jamming problem subject to protocol interference
HR Medal
Networks 67 (2), 111-125, 2016
A stochastic programming model with endogenous uncertainty for selecting supplier development programs to proactively mitigate supplier risk
R Zhou, TH Bhuiyan, HR Medal, MD Sherwin, D Yang
Omega 107, 102542, 2022
The system can't perform the operation now. Try again later.
Articles 1–20