-
Magnetism in metastable and annealed compositionally complex alloys
Nan Tang, Lizabeth Quigley, Walker L. Boldman, Cameron S. Jorgensen, Rémi Koch, Daniel O'Leary, Hugh R. Medal, Philip D. Rack, and Dustin A. Gilbert.
Publication Year: 2022
[Link to Article] Abstract -
Optimization of twice-daily direct flyover data collection for satellite observations at uncertain locations
AB Hoskins, HR Medal, E Rashidi. AB Hoskins, HR Medal, E Rashidi (2022) Advances in Space Research 70 (4), 1013-1031
Publication Year: 2022
[Link to Article] -
The wireless network jamming problem subject to protocol interference using directional antennas and with battery capacity constraints
JD Huff, WB Leonard, HR Medal. (2022). International Journal of Critical Infrastructure Protection 39, 100572
Publication Year: 2022
[Link to Article] Abstract -
A stochastic programming model with endogenous uncertainty for proactive supplier risk mitigation of low-volume-high-value manufacturers considering decision-dependent supplier performance
Rui Zhou, Bhuiyan, Tanveer Hossain, Michael Sherwin, and Medal, H.. Zhou, Rui, Tanveer Hossain Bhuiyan, Hugh R. Medal, Michael D. Sherwin, and Dong Yang. "A stochastic programming model with endogenous uncertainty for selecting supplier development programs to proactively mitigate supplier risk." Omega 107 (2022): 102542.
Publication Year: 2022
[Link to Article] Abstract -
Risk-averse Bi-level Stochastic Network Interdiction Model for Cyber-security
Bhuiyan, Tanveer Hossain, Hugh R. Medal, Apurba K. Nandi, and Mahantesh Halappanavar. (2022) Risk-averse bi-level stochastic network interdiction model for cyber-security risk management." International Journal of Critical Infrastructure Protection 32 (2021): 100408.
Publication Year: 2021
[Link to Article] Abstract -
Atomistic modeling of meso-timescale processes with SEAKMC: A perspective and recent developments
Sho Hayakawa, Jake Isaacs, Hugh R Medal, Haixuan Xu.
Publication Year: 2021
[Link to Article] Abstract -
Identifying and mitigating supply chain risks using fault tree optimization
Sherwin, M., Brown, K. J., Medal, H., and Mackenzie, C.. Michael D. Sherwin, Hugh R. Medal, Cameron A. MacKenzie & Kennedy J. Brown (2020) Identifying and mitigating supply chain risks using fault tree optimization, IISE Transactions, 52:2, 236-254
Publication Year: 2020
[Link to Article] Abstract -
A stochastic programming model with endogenous and exogenous uncertainty for reliable network design under random disruption
Bhuiyan, T. H. and Medal H.. Bhuiyan, T. H., Medal, H. R., & Harun, S. (2020). A stochastic programming model with endogenous and exogenous uncertainty for reliable network design under random disruption. European Journal of Operational Research, 285(2), 670-694.
Publication Year: 2020
[Link to Article] Abstract -
Connected Infrastructure Network Design Under Additive Service Utilities
Li, X. and Medal, H.. Connected Infrastructure Network Design Under Additive Service Utilities. Transportation Research Part B 120, 99–124.
Publication Year: 2019
[Link to Article] Abstract -
A Model-Based Systems Engineering Approach to Critical Infrastructure Vulnerability Assessment and Decision Analysis
Huff, J. D., Medal, H., and K. A. Griendling. Submitted to Systems Engineering 22(2), 114–133.
Publication Year: 2019
[Link to Article] Abstract -
NATO Human View Executable Architectures for Critical Infrastructure Analysis
Huff, J. D., Leonard, W., B. Smith, K. Griendling, and Medal, H.. Engineering Management Journal. 31:4, 224-245.
Publication Year: 2019
[Link to Article] Abstract -
Stochastic Programming Solution for Placement of Satellite Ground Stations
Aaron Hoskins, Hugh Medal. To appear in Annals of Operations Research.
Publication Year: 2019
Abstract -
Wireless LAN transmitter location under the threat of jamming attacks
David Schweitzer and Medal, H. (2019).. Computers and Operations Research 106, 14–27.
Publication Year: 2019
[Link to Article] Abstract -
A stochastic programming model with endogenous uncertainty for incentivizing fuel reduction treatment under uncertain landowner behavior
Bhuiyan, T. H., Moseley, M., Medal, H., E Rashidi, and R Grala (2019).. European Journal of Operational Research 277(2), 699–718.
Publication Year: 2019
-
A mixed-integer programming approach for optimizing flow jamming attacks
Satish Vadlamani, Hugh Medal, David Schweitzer, Apurba Nandi, Burak Ekşioğlu. Vadlamani, S., Schweitzer, D., Medal, H., Nandi, A., & Eksioglu, B. (2018). A mixed-integer programming approach for locating jamming devices in a flow-jamming attack. Computers & Operations Research, 95, 83-96.
Publication Year: 2018
[PDF] [Link to Article] Abstract -
An attacker-defender model for analyzing the vulnerability of initial attack in wildfire suppression
Rashidi, E., Medal, H., and Hoskins, A.. Naval Research Logistics 65(2), 120–134.
Publication Year: 2018
Abstract -
Mitigating a pyro-terror attack using fuel management
Eghbal Rashidi, Hugh Medal. To appear in IISE Transactions.
Publication Year: 2018
Abstract -
Analyzing the robustness of an array of wireless access points to mobile jammers
Schweitzer, David, Ruholla Jafari-Marandi, and Hugh Medal. Computers & Industrial Engineering 107 (2017): 25-38
Publication Year: 2017
[Link to Article] Abstract -
A maximal covering location-based model for analyzing the vulnerability of landscapes to wildfires: Assessing the worst-case scenario
Eghbal Rashidi, Hugh Medal, Jason Gordon, Robert Grala, Morgan Varner. European Journal of Operational Research, Volume 258, Issue 3, Pages 1095–1105
Publication Year: 2017
[PDF] [Link to Article] Abstract -
Satellite Constellation Design for Forest Fire Monitoring Via a Stochastic Programming Approach
Aaron Hoskins, Hugh Medal, Eghbal Rashidi. To appear in Naval Research Logistics.
Publication Year: 2017
Abstract -
Botnet Detection Using Graph-Based Feature Clustering
Chowdhury, S., Khanzadehdaghalian, M., Akula, R., Zhang, F., S. Zhang, Medal, H., M. Marufuzzaman, and L. Bian. To appear in Journal of Big Data.
Publication Year: 2017
Abstract -
Jamming Attacks on Wireless Networks: A Taxonomic Survey
Satish Vadlamani, Burak Ekşioğlu, Hugh Medal, Apurba Nandi. International Journal of Production Economics, Volume 172, Pages 76–94
Publication Year: 2016
[PDF] [Link to Article] Abstract -
Proactive Cost-Effective Risk Mitigation in a Low Volume High Value Supply Chain Using Fault-Tree Analysis
Michael D. Sherwin, Hugh Medal, Steven A. Lapp. International Journal of Production Economics, Volume 175, Pages 153–163
Publication Year: 2016
[PDF] [Link to Article] Abstract -
Optimal traffic calming: A mixed-integer bi-level programming model for locating sidewalks and crosswalks in a multimodal transportation network to maximize pedestrians’ safety and network usability
Eghbal Rashidi, Mohsen Parsafard, Hugh Medal, Xiaopeng Li. Transportation Research Part E: Logistics and Transportation Review, Volume 91, Pages 33–50
Publication Year: 2016
[PDF] [Link to Article] Abstract -
Interdicting Attack Graphs to Protect Organizations from Cyber Attacks: A Bi-Level Attacker-Defender Model
Apurba K. Nandi, Hugh R. Medal, Satish Vadlamani. Computers & Operations Research, Volume 75, Pages 118–131
Publication Year: 2016
[PDF] [Link to Article] Abstract -
Models for Removing Links in a Network to Minimize the Spread of Infections
Apurba K. Nandi, Hugh R. Medal. Computers & Operations Research, Volume 69, Pages 10–24
Publication Year: 2016
[PDF] [Link to Article] Abstract -
Allocating Protection Resources to Facilities When the Effect of Protection is Uncertain
Hugh R. Medal, Edward A. Pohl, Manuel D. Rossetti. IIE Transactions 48(3), 220–234.
Publication Year: 2016
[PDF] [Link to Article] Abstract -
The wireless network jamming problem subject to protocol interference
Hugh R. Medal. Networks 67(2), 111–125
Publication Year: 2016
[PDF] [Link to Article] Abstract -
A Bi-objective Analysis of the R-All-Neighbor P-Center Problem
Hugh R. Medal, Chase E. Rainwater, Edward A. Pohl, Manuel D. Rossetti. Computers & Industrial Engineering, Volume 72, Pages 114–128
Publication Year: 2014
[PDF] [Link to Article] Abstract -
A Multi-objective Integrated Facility Location-Hardening Model: Analyzing the Pre- and Post-Disruption Tradeoff
Hugh R. Medal, Edward A. Pohl, Manuel D. Rossetti. European Journal of Operational Research, Volume 237, 257– 270
Publication Year: 2014
[PDF] [Link to Article] Abstract -
Robust Facility Location: Hedging Against Failures
Ivan Hernandez, Jose Emmanuel Ramirez-Marquez, Chase Rainwater, Edward Pohl, Hugh Medal. Reliability Engineering & System Safety, Volume 123, Pages 73–80
Publication Year: 2014
[PDF] [Link to Article] Abstract -
Vulnerability Assessment and Re-routing of Freight Trains Under Disruptions: A Coal Supply Chain Network Application
Ridvan Gedik, Hugh Medal, Chase Rainwater, Ed A. Pohl, Scott J. Mason. Transportation Research Part E, Volume 71, 45–57
Publication Year: 2014
[PDF] [Link to Article] Abstract -
Models for reducing the risk of critical networked infrastructures
Hugh Medal, Stevenson J. Sharp, Ed Pohl, Chase Rainwater, Scott J. Mason. International Journal of Risk Assessment and Management, Volume 15 (No. 2/3), Pages 99-127
Publication Year: 2011
[PDF] [Link to Article] Abstract
Working Drafts
-
Computing the Vulnerability of Multi-Hop Wireless Networks: A Search for the Best Interference Model
Medal, H. and Schweitzer, D. Tech. rep. Starkville, MS: Mississippi State University.
Publication Year: 2017 -
Network interdiction model for cyber security against bounded rational attacker
Nandi, A. K., M. Halappanavar, Medal, H., and Bhuiyan, T. H. Tec
Publication Year: 2017 -
Risk-averse Bi-level Stochastic Network Interdiction Model for Cyber-security
Bhuiyan, T. H., Nandi, A. K., Medal, H., and M. Halappanavar Tech. rep. Starkville, MS: Mississippi State University.
Publication Year: 2017 [PDF] [Link to Article]
Under Review
-
A spatial branch-and-bound approach for maximization of non-factorable monotone continuous submodular functions.
H Medal, I Ahanor H Medal, I Ahanor (2022). A spatial branch-and-bound approach for maximization of non-factorable monotone continuous submodular functions
Publication Year: 2022 [Link to Article] -
Predicting Supplier Reliability in a Low Volume High Value Supply Chain Using Machine Learning.
Mike Sherwin, Medal, H., and C Mackenzie (2020). Tech. rep. Knoxville, TN: University of Tennessee.
Publication Year: 2020
Under Revision
-
A Multi-modal User Equilibrium Traffic Assignment with Network Expansion
Parsafard, M., Rashidi, E., X. Li, and Medal, H.
Publication Year: 2016
Peer-reviewed Conference Papers
-
A Visual Evaluation Study of Graph Sampling Techniques.
Zhang, Fangyan; Zhang, Song; Chung Wong, Pak; Medal, Hugh; Bian, Linkan; Swan II, J. Edward; Jankun-Kelly, T.J. Proceedings of the 7th annual IS&T International Symposium on Electronic Imaging 2017, no. 1 (2017): 110-117. Atlanta, GA.
Publication Year: 2017 [Link to Article] -
Analyzing the Vulnerability of a Single-Hop Wireless Network Grid
Schweitzer, D., Jafari, R., and Medal, H. Proceedings of the Industrial and Systems Engineering Research Conference. Anaheim, CA, United States.
Publication Year: 2016 -
Information diffusion in social networks with individual time constraints
Rashidi, E. and Medal, H. Proceedings of the Industrial and Systems Engineering Research Conference. Anaheim, CA, United States.
Publication Year: 2016 -
A Stochastic Programming Approach to Satellite Wildfire Observations
Hoskins, A. and Medal, H. Proceedings of the Industrial and Systems Engineering Research Conference. Anaheim, CA, United States.
Publication Year: 2016 -
Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success
Bhuiyan, T. H., Nandi, A. K., Medal, H., and M. Halappanavar Accepted for publication in IEEE International Conference on Technologies for Homeland Security. Waltham, Massachusetts, USA
Publication Year: 2016 -
Students’ Experiences with an Open-ended Client Project in a Graduate Course
Heier-Stamm, J, R Burch, and Medal, H. Proceedings of the 112nd ASEE Annual Conference and Exposition. Seattle, Washington, USA.
Publication Year: 2015 -
A Bi-Level Programming Model for the Wireless Network Jamming Placement Problem.
Satish Vadlamani, Hugh Medal, Burak Ekşioğlu, Pan Li Proceedings of the 2014 Industrial and Systems Engineering Research Conference
Publication Year: 2014 [PDF] -
A Network Design Model under Connectivity Constraints with Heterogeneous Services
Li, X., Medal, H., and Wang, J. Proceedings of the 2014 Transportation Research Board Conference. Washington, D.C.
Publication Year: 2014 -
Link removal models for minimizing the spread of infections in a network.
Nandi, A. K. and Medal, H. In: Proceedings of the 8th INFORMS Workshop on Data Mining and Health Informatics (DM-HI 2013). Ed. by O Seref, N Serban, and D Zeng. INFORMS.
Publication Year: 2013 -
A Software Tool for Intermittent Demand Analysis
Medal, H., M. D. Rossetti, Varghese, V.M., and E. A. Pohl 2009 Industrial Engineering Research Conference. Ed. by J. C. Smith and J. Geunes. Miami, Florida, pp.1658–1663 (CD)
Publication Year: 2009 -
Pickup and Delivery of Poultry in Rural Networks.
Medal, H., S. J. Gade, D.and Mason, R. D. Meller, and E. A. Pohl 2008 Industrial Engineering Research Conference. Ed. by J. Fowler and S. Mason. Vancouver, Canada, pp.1897–1902
Publication Year: 2008
Book Chapters
-
Security in Wireless Networks: An Operations Research Oriented Tutorial
Satish Vadlamani, Hugh Medal, Burak Ekşioğlu, Pan Li NATO Science for Peace and Security, Volume 37, Pages 272–288
Publication Year: 2014 [PDF] [Link to Article]
Dissertation
-
Locating and Protecting Facilities Subject to Random Disruptions and Attacks
Hugh Medal PhD thesis. Fayetteville, Arkansas: University of Arkansas.
Publication Year: 2012 [PDF]