Hugh R. Medal

Orcid: 0000-0002-0666-8410

Affiliations:
  • University of Tennessee, Knoxville, TN, USA


According to our database1, Hugh R. Medal authored at least 25 papers between 2014 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
The wireless network jamming problem subject to protocol interference using directional antennas and with battery capacity constraints.
Int. J. Crit. Infrastructure Prot., 2022

DiversiTree: Computing Diverse Sets of Near-Optimal Solutions to Mixed-Integer Optimization Problems.
CoRR, 2022

2021
Risk-averse bi-level stochastic network interdiction model for cyber-security risk management.
Int. J. Crit. Infrastructure Prot., 2021

2020
Identifying and mitigating supply chain risks using fault tree optimization.
IISE Trans., 2020

A stochastic programming model with endogenous and exogenous uncertainty for reliable network design under random disruption.
Eur. J. Oper. Res., 2020

2019
A model-based systems engineering approach to critical infrastructure vulnerability assessment and decision analysis.
Syst. Eng., 2019

A stochastic programming model with endogenous uncertainty for incentivizing fuel reduction treatment under uncertain landowner behavior.
Eur. J. Oper. Res., 2019

Wireless LAN transmitter location under the threat of jamming attacks.
Comput. Oper. Res., 2019

Stochastic programming solution for placement of satellite ground stations.
Ann. Oper. Res., 2019

Towards Scalable Planning of Wireless Networks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

2018
A mixed-integer programming approach for locating jamming devices in a flow-jamming attack.
Comput. Oper. Res., 2018

Stochastic Programming Approach for Resource Selection Under Demand Uncertainty.
Proceedings of the Job Scheduling Strategies for Parallel Processing, 2018

Chapel HyperGraph Library (CHGL).
Proceedings of the 2018 IEEE High Performance Extreme Computing Conference, 2018

2017
Botnet detection using graph-based feature clustering.
J. Big Data, 2017

A maximal covering location-based model for analyzing the vulnerability of landscapes to wildfires: Assessing the worst-case scenario.
Eur. J. Oper. Res., 2017

Analyzing the robustness of an array of wireless access points to mobile jammers.
Comput. Ind. Eng., 2017

A Visual Evaluation Study of Graph Sampling Techniques.
Proceedings of the Visualization and Data Analysis 2017, Burlingame, CA, USA, 29 January 2017, 2017

Bot Classification for Real-Life Highly Class-Imbalanced Dataset.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
The wireless network jamming problem subject to protocol interference.
Networks, 2016

Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender-attacker model.
Comput. Oper. Res., 2016

Methods for removing links in a network to minimize the spread of infections.
Comput. Oper. Res., 2016

2014
Security in Wireless Networks: A Tutorial.
Proceedings of the Examining Robustness and Vulnerability of Networked Systems, 2014

Robust facility location: Hedging against failures.
Reliab. Eng. Syst. Saf., 2014

A multi-objective integrated facility location-hardening model: Analyzing the pre- and post-disruption tradeoff.
Eur. J. Oper. Res., 2014

A bi-objective analysis of the r-all-neighbor p-center problem.
Comput. Ind. Eng., 2014


  Loading...