1. Magnetism in metastable and annealed compositionally complex alloys
    Nan Tang, Lizabeth Quigley, Walker L. Boldman, Cameron S. Jorgensen, Rémi Koch, Daniel O'Leary, Hugh R. Medal, Philip D. Rack, and Dustin A. Gilbert.
    Publication Year: 2022
    [Link to Article] Abstract
  2. Optimization of twice-daily direct flyover data collection for satellite observations at uncertain locations
    AB Hoskins, HR Medal, E Rashidi. AB Hoskins, HR Medal, E Rashidi (2022) Advances in Space Research 70 (4), 1013-1031
    Publication Year: 2022
    [Link to Article]
  3. The wireless network jamming problem subject to protocol interference using directional antennas and with battery capacity constraints
    JD Huff, WB Leonard, HR Medal. (2022). International Journal of Critical Infrastructure Protection 39, 100572
    Publication Year: 2022
    [Link to Article] Abstract
  4. A stochastic programming model with endogenous uncertainty for proactive supplier risk mitigation of low-volume-high-value manufacturers considering decision-dependent supplier performance
    Rui Zhou, Bhuiyan, Tanveer Hossain, Michael Sherwin, and Medal, H.. Zhou, Rui, Tanveer Hossain Bhuiyan, Hugh R. Medal, Michael D. Sherwin, and Dong Yang. "A stochastic programming model with endogenous uncertainty for selecting supplier development programs to proactively mitigate supplier risk." Omega 107 (2022): 102542.
    Publication Year: 2022
    [Link to Article] Abstract
  5. Risk-averse Bi-level Stochastic Network Interdiction Model for Cyber-security
    Bhuiyan, Tanveer Hossain, Hugh R. Medal, Apurba K. Nandi, and Mahantesh Halappanavar. (2022) Risk-averse bi-level stochastic network interdiction model for cyber-security risk management." International Journal of Critical Infrastructure Protection 32 (2021): 100408.
    Publication Year: 2021
    [Link to Article] Abstract
  6. Atomistic modeling of meso-timescale processes with SEAKMC: A perspective and recent developments
    Sho Hayakawa, Jake Isaacs, Hugh R Medal, Haixuan Xu.
    Publication Year: 2021
    [Link to Article] Abstract
  7. Identifying and mitigating supply chain risks using fault tree optimization
    Sherwin, M., Brown, K. J., Medal, H., and Mackenzie, C.. Michael D. Sherwin, Hugh R. Medal, Cameron A. MacKenzie & Kennedy J. Brown (2020) Identifying and mitigating supply chain risks using fault tree optimization, IISE Transactions, 52:2, 236-254
    Publication Year: 2020
    [Link to Article] Abstract
  8. A stochastic programming model with endogenous and exogenous uncertainty for reliable network design under random disruption
    Bhuiyan, T. H. and Medal H.. Bhuiyan, T. H., Medal, H. R., & Harun, S. (2020). A stochastic programming model with endogenous and exogenous uncertainty for reliable network design under random disruption. European Journal of Operational Research, 285(2), 670-694.
    Publication Year: 2020
    [Link to Article] Abstract
  9. Connected Infrastructure Network Design Under Additive Service Utilities
    Li, X. and Medal, H.. Connected Infrastructure Network Design Under Additive Service Utilities. Transportation Research Part B 120, 99–124.
    Publication Year: 2019
    [Link to Article] Abstract
  10. A Model-Based Systems Engineering Approach to Critical Infrastructure Vulnerability Assessment and Decision Analysis
    Huff, J. D., Medal, H., and K. A. Griendling. Submitted to Systems Engineering 22(2), 114–133.
    Publication Year: 2019
    [Link to Article] Abstract
  11. NATO Human View Executable Architectures for Critical Infrastructure Analysis
    Huff, J. D., Leonard, W., B. Smith, K. Griendling, and Medal, H.. Engineering Management Journal. 31:4, 224-245.
    Publication Year: 2019
    [Link to Article] Abstract
  12. Stochastic Programming Solution for Placement of Satellite Ground Stations
    Aaron Hoskins, Hugh Medal. To appear in Annals of Operations Research.
    Publication Year: 2019
    Abstract
  13. Wireless LAN transmitter location under the threat of jamming attacks
    David Schweitzer and Medal, H. (2019).. Computers and Operations Research 106, 14–27.
    Publication Year: 2019
    [Link to Article] Abstract
  14. A stochastic programming model with endogenous uncertainty for incentivizing fuel reduction treatment under uncertain landowner behavior
    Bhuiyan, T. H., Moseley, M., Medal, H., E Rashidi, and R Grala (2019).. European Journal of Operational Research 277(2), 699–718.
    Publication Year: 2019
  15. A mixed-integer programming approach for optimizing flow jamming attacks
    Satish Vadlamani, Hugh Medal, David Schweitzer, Apurba Nandi, Burak Ekşioğlu. Vadlamani, S., Schweitzer, D., Medal, H., Nandi, A., & Eksioglu, B. (2018). A mixed-integer programming approach for locating jamming devices in a flow-jamming attack. Computers & Operations Research, 95, 83-96.
    Publication Year: 2018
    [PDF]   [Link to Article] Abstract
  16. An attacker-defender model for analyzing the vulnerability of initial attack in wildfire suppression
    Rashidi, E., Medal, H., and Hoskins, A.. Naval Research Logistics 65(2), 120–134.
    Publication Year: 2018
    Abstract
  17. Mitigating a pyro-terror attack using fuel management
    Eghbal Rashidi, Hugh Medal. To appear in IISE Transactions.
    Publication Year: 2018
    Abstract
  18. Analyzing the robustness of an array of wireless access points to mobile jammers
    Schweitzer, David, Ruholla Jafari-Marandi, and Hugh Medal. Computers & Industrial Engineering 107 (2017): 25-38
    Publication Year: 2017
    [Link to Article] Abstract
  19. A maximal covering location-based model for analyzing the vulnerability of landscapes to wildfires: Assessing the worst-case scenario
    Eghbal Rashidi, Hugh Medal, Jason Gordon, Robert Grala, Morgan Varner. European Journal of Operational Research, Volume 258, Issue 3, Pages 1095–1105
    Publication Year: 2017
    [PDF]   [Link to Article] Abstract
  20. Satellite Constellation Design for Forest Fire Monitoring Via a Stochastic Programming Approach
    Aaron Hoskins, Hugh Medal, Eghbal Rashidi. To appear in Naval Research Logistics.
    Publication Year: 2017
    Abstract
  21. Botnet Detection Using Graph-Based Feature Clustering
    Chowdhury, S., Khanzadehdaghalian, M., Akula, R., Zhang, F., S. Zhang, Medal, H., M. Marufuzzaman, and L. Bian. To appear in Journal of Big Data.
    Publication Year: 2017
    Abstract
  22. Jamming Attacks on Wireless Networks: A Taxonomic Survey
    Satish Vadlamani, Burak Ekşioğlu, Hugh Medal, Apurba Nandi. International Journal of Production Economics, Volume 172, Pages 76–94
    Publication Year: 2016
    [PDF]   [Link to Article] Abstract
  23. Proactive Cost-Effective Risk Mitigation in a Low Volume High Value Supply Chain Using Fault-Tree Analysis
    Michael D. Sherwin, Hugh Medal, Steven A. Lapp. International Journal of Production Economics, Volume 175, Pages 153–163
    Publication Year: 2016
    [PDF]   [Link to Article] Abstract
  24. Optimal traffic calming: A mixed-integer bi-level programming model for locating sidewalks and crosswalks in a multimodal transportation network to maximize pedestrians’ safety and network usability
    Eghbal Rashidi, Mohsen Parsafard, Hugh Medal, Xiaopeng Li. Transportation Research Part E: Logistics and Transportation Review, Volume 91, Pages 33–50
    Publication Year: 2016
    [PDF]   [Link to Article] Abstract
  25. Interdicting Attack Graphs to Protect Organizations from Cyber Attacks: A Bi-Level Attacker-Defender Model
    Apurba K. Nandi, Hugh R. Medal, Satish Vadlamani. Computers & Operations Research, Volume 75, Pages 118–131
    Publication Year: 2016
    [PDF]   [Link to Article] Abstract
  26. Models for Removing Links in a Network to Minimize the Spread of Infections
    Apurba K. Nandi, Hugh R. Medal. Computers & Operations Research, Volume 69, Pages 10–24
    Publication Year: 2016
    [PDF]   [Link to Article] Abstract
  27. Allocating Protection Resources to Facilities When the Effect of Protection is Uncertain
    Hugh R. Medal, Edward A. Pohl, Manuel D. Rossetti. IIE Transactions 48(3), 220–234.
    Publication Year: 2016
    [PDF]   [Link to Article] Abstract
  28. The wireless network jamming problem subject to protocol interference
    Hugh R. Medal. Networks 67(2), 111–125
    Publication Year: 2016
    [PDF]   [Link to Article] Abstract
  29. A Bi-objective Analysis of the R-All-Neighbor P-Center Problem
    Hugh R. Medal, Chase E. Rainwater, Edward A. Pohl, Manuel D. Rossetti. Computers & Industrial Engineering, Volume 72, Pages 114–128
    Publication Year: 2014
    [PDF]   [Link to Article] Abstract
  30. A Multi-objective Integrated Facility Location-Hardening Model: Analyzing the Pre- and Post-Disruption Tradeoff
    Hugh R. Medal, Edward A. Pohl, Manuel D. Rossetti. European Journal of Operational Research, Volume 237, 257– 270
    Publication Year: 2014
    [PDF]   [Link to Article] Abstract
  31. Robust Facility Location: Hedging Against Failures
    Ivan Hernandez, Jose Emmanuel Ramirez-Marquez, Chase Rainwater, Edward Pohl, Hugh Medal. Reliability Engineering & System Safety, Volume 123, Pages 73–80
    Publication Year: 2014
    [PDF]   [Link to Article] Abstract
  32. Vulnerability Assessment and Re-routing of Freight Trains Under Disruptions: A Coal Supply Chain Network Application
    Ridvan Gedik, Hugh Medal, Chase Rainwater, Ed A. Pohl, Scott J. Mason. Transportation Research Part E, Volume 71, 45–57
    Publication Year: 2014
    [PDF]   [Link to Article] Abstract
  33. Models for reducing the risk of critical networked infrastructures
    Hugh Medal, Stevenson J. Sharp, Ed Pohl, Chase Rainwater, Scott J. Mason. International Journal of Risk Assessment and Management, Volume 15 (No. 2/3), Pages 99-127
    Publication Year: 2011
    [PDF]   [Link to Article] Abstract

Working Drafts

  1. Computing the Vulnerability of Multi-Hop Wireless Networks: A Search for the Best Interference Model
    Medal, H. and Schweitzer, D. Tech. rep. Starkville, MS: Mississippi State University.
    Publication Year: 2017
  2. Network interdiction model for cyber security against bounded rational attacker
    Nandi, A. K., M. Halappanavar, Medal, H., and Bhuiyan, T. H. Tec
    Publication Year: 2017
  3. Risk-averse Bi-level Stochastic Network Interdiction Model for Cyber-security
    Bhuiyan, T. H., Nandi, A. K., Medal, H., and M. Halappanavar Tech. rep. Starkville, MS: Mississippi State University.
    Publication Year: 2017 [PDF]   [Link to Article]

Under Review

  1. A spatial branch-and-bound approach for maximization of non-factorable monotone continuous submodular functions.
    H Medal, I Ahanor H Medal, I Ahanor (2022). A spatial branch-and-bound approach for maximization of non-factorable monotone continuous submodular functions
    Publication Year: 2022 [Link to Article]
  2. Predicting Supplier Reliability in a Low Volume High Value Supply Chain Using Machine Learning.
    Mike Sherwin, Medal, H., and C Mackenzie (2020). Tech. rep. Knoxville, TN: University of Tennessee.
    Publication Year: 2020

Under Revision

  1. A Multi-modal User Equilibrium Traffic Assignment with Network Expansion
    Parsafard, M., Rashidi, E., X. Li, and Medal, H.
    Publication Year: 2016

Peer-reviewed Conference Papers

  1. A Visual Evaluation Study of Graph Sampling Techniques.
    Zhang, Fangyan; Zhang, Song; Chung Wong, Pak; Medal, Hugh; Bian, Linkan; Swan II, J. Edward; Jankun-Kelly, T.J. Proceedings of the 7th annual IS&T International Symposium on Electronic Imaging 2017, no. 1 (2017): 110-117. Atlanta, GA.
    Publication Year: 2017 [Link to Article]
  2. Analyzing the Vulnerability of a Single-Hop Wireless Network Grid
    Schweitzer, D., Jafari, R., and Medal, H. Proceedings of the Industrial and Systems Engineering Research Conference. Anaheim, CA, United States.
    Publication Year: 2016
  3. Information diffusion in social networks with individual time constraints
    Rashidi, E. and Medal, H. Proceedings of the Industrial and Systems Engineering Research Conference. Anaheim, CA, United States.
    Publication Year: 2016
  4. A Stochastic Programming Approach to Satellite Wildfire Observations
    Hoskins, A. and Medal, H. Proceedings of the Industrial and Systems Engineering Research Conference. Anaheim, CA, United States.
    Publication Year: 2016
  5. Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success
    Bhuiyan, T. H., Nandi, A. K., Medal, H., and M. Halappanavar Accepted for publication in IEEE International Conference on Technologies for Homeland Security. Waltham, Massachusetts, USA
    Publication Year: 2016
  6. Students’ Experiences with an Open-ended Client Project in a Graduate Course
    Heier-Stamm, J, R Burch, and Medal, H. Proceedings of the 112nd ASEE Annual Conference and Exposition. Seattle, Washington, USA.
    Publication Year: 2015
  7. A Bi-Level Programming Model for the Wireless Network Jamming Placement Problem.
    Satish Vadlamani, Hugh Medal, Burak Ekşioğlu, Pan Li Proceedings of the 2014 Industrial and Systems Engineering Research Conference
    Publication Year: 2014 [PDF]  
  8. A Network Design Model under Connectivity Constraints with Heterogeneous Services
    Li, X., Medal, H., and Wang, J. Proceedings of the 2014 Transportation Research Board Conference. Washington, D.C.
    Publication Year: 2014
  9. Link removal models for minimizing the spread of infections in a network.
    Nandi, A. K. and Medal, H. In: Proceedings of the 8th INFORMS Workshop on Data Mining and Health Informatics (DM-HI 2013). Ed. by O Seref, N Serban, and D Zeng. INFORMS.
    Publication Year: 2013
  10. A Software Tool for Intermittent Demand Analysis
    Medal, H., M. D. Rossetti, Varghese, V.M., and E. A. Pohl 2009 Industrial Engineering Research Conference. Ed. by J. C. Smith and J. Geunes. Miami, Florida, pp.1658–1663 (CD)
    Publication Year: 2009
  11. Pickup and Delivery of Poultry in Rural Networks.
    Medal, H., S. J. Gade, D.and Mason, R. D. Meller, and E. A. Pohl 2008 Industrial Engineering Research Conference. Ed. by J. Fowler and S. Mason. Vancouver, Canada, pp.1897–1902
    Publication Year: 2008

Book Chapters

  1. Security in Wireless Networks: An Operations Research Oriented Tutorial
    Satish Vadlamani, Hugh Medal, Burak Ekşioğlu, Pan Li NATO Science for Peace and Security, Volume 37, Pages 272–288
    Publication Year: 2014 [PDF]   [Link to Article]

Dissertation

  1. Locating and Protecting Facilities Subject to Random Disruptions and Attacks
    Hugh Medal PhD thesis. Fayetteville, Arkansas: University of Arkansas.
    Publication Year: 2012 [PDF]