1. An optimized resource allocation approach to identify and mitigate supply chain risks using fault-tree analysis
    Sherwin, M., Brown, K. J., Medal, H., and Mackenzie, C.. IISE Transactions 52(2). to appear, 236–254.
    Publication Year: 2020
    Abstract
  2. Network Design and Facility Protection when the Effect of Protection is Uncertain
    Bhuiyan, T. H. and Medal H. (2020). European Journal of Operational Research
    Publication Year: 2020
  3. Connected Infrastructure Network Design Under Additive Service Utilities
    Li, X. and Medal, H.. Connected Infrastructure Network Design Under Additive Service Utilities. Transportation Research Part B 120, 99–124.
    Publication Year: 2019
    [Link to Article] Abstract
  4. A Model-Based Systems Engineering Approach to Critical Infrastructure Vulnerability Assessment and Decision Analysis
    Huff, J. D., Medal, H., and K. A. Griendling. Submitted to Systems Engineering 22(2), 114–133.
    Publication Year: 2019
    [Link to Article] Abstract
  5. NATO Human View Executable Architectures for Critical Infrastructure Analysis
    Huff, J. D., Leonard, W., B. Smith, K. Griendling, and Medal, H.. Engineering Management Journal. 31:4, 224-245.
    Publication Year: 2019
    [Link to Article] Abstract
  6. Stochastic Programming Solution for Placement of Satellite Ground Stations
    Aaron Hoskins, Hugh Medal. To appear in Annals of Operations Research.
    Publication Year: 2019
    Abstract
  7. Wireless LAN transmitter location under the threat of jamming attacks
    David Schweitzer and Medal, H. (2019).. Computers and Operations Research 106, 14–27.
    Publication Year: 2019
    [Link to Article] Abstract
  8. A stochastic programming model with endogenous uncertainty for incentivizing fuel reduction treatment under uncertain landowner behavior
    Bhuiyan, T. H., Moseley, M., Medal, H., E Rashidi, and R Grala (2019).. European Journal of Operational Research 277(2), 699–718.
    Publication Year: 2019
  9. A mixed-integer programming approach for optimizing flow jamming attacks
    Satish Vadlamani, Hugh Medal, David Schweitzer, Apurba Nandi, Burak Ekşioğlu. To appear in Computers and Operations Research.
    Publication Year: 2018
    [PDF]   Abstract
  10. An attacker-defender model for analyzing the vulnerability of initial attack in wildfire suppression
    Rashidi, E., Medal, H., and Hoskins, A.. Submitted to Naval Research Logistics 65(2), 120–134.
    Publication Year: 2018
  11. Mitigating a pyro-terror attack using fuel management
    Eghbal Rashidi, Hugh Medal. To appear in IISE Transactions.
    Publication Year: 2018
    Abstract
  12. Analyzing the robustness of an array of wireless access points to mobile jammers
    Schweitzer, David, Ruholla Jafari-Marandi, and Hugh Medal. Computers & Industrial Engineering 107 (2017): 25-38
    Publication Year: 2017
    [Link to Article] Abstract
  13. A maximal covering location-based model for analyzing the vulnerability of landscapes to wildfires: Assessing the worst-case scenario
    Eghbal Rashidi, Hugh Medal, Jason Gordon, Robert Grala, Morgan Varner. European Journal of Operational Research, Volume 258, Issue 3, Pages 1095–1105
    Publication Year: 2017
    [PDF]   [Link to Article] Abstract
  14. Satellite Constellation Design for Forest Fire Monitoring Via a Stochastic Programming Approach
    Aaron Hoskins, Hugh Medal, Eghbal Rashidi. To appear in Naval Research Logistics.
    Publication Year: 2017
    Abstract
  15. Botnet Detection Using Graph-Based Feature Clustering
    Chowdhury, S., Khanzadehdaghalian, M., Akula, R., Zhang, F., S. Zhang, Medal, H., M. Marufuzzaman, and L. Bian. To appear in Journal of Big Data.
    Publication Year: 2017
    Abstract
  16. Jamming Attacks on Wireless Networks: A Taxonomic Survey
    Satish Vadlamani, Burak Ekşioğlu, Hugh Medal, Apurba Nandi. International Journal of Production Economics, Volume 172, Pages 76–94
    Publication Year: 2016
    [PDF]   [Link to Article] Abstract
  17. Proactive Cost-Effective Risk Mitigation in a Low Volume High Value Supply Chain Using Fault-Tree Analysis
    Michael D. Sherwin, Hugh Medal, Steven A. Lapp. International Journal of Production Economics, Volume 175, Pages 153–163
    Publication Year: 2016
    [PDF]   [Link to Article] Abstract
  18. Optimal traffic calming: A mixed-integer bi-level programming model for locating sidewalks and crosswalks in a multimodal transportation network to maximize pedestrians’ safety and network usability
    Eghbal Rashidi, Mohsen Parsafard, Hugh Medal, Xiaopeng Li. Transportation Research Part E: Logistics and Transportation Review, Volume 91, Pages 33–50
    Publication Year: 2016
    [PDF]   [Link to Article] Abstract
  19. Interdicting Attack Graphs to Protect Organizations from Cyber Attacks: A Bi-Level Attacker-Defender Model
    Apurba K. Nandi, Hugh R. Medal, Satish Vadlamani. Computers & Operations Research, Volume 75, Pages 118–131
    Publication Year: 2016
    [PDF]   [Link to Article] Abstract
  20. Models for Removing Links in a Network to Minimize the Spread of Infections
    Apurba K. Nandi, Hugh R. Medal. Computers & Operations Research, Volume 69, Pages 10–24
    Publication Year: 2016
    [PDF]   [Link to Article] Abstract
  21. Allocating Protection Resources to Facilities When the Effect of Protection is Uncertain
    Hugh R. Medal, Edward A. Pohl, Manuel D. Rossetti. IIE Transactions 48(3), 220–234.
    Publication Year: 2016
    [PDF]   [Link to Article] Abstract
  22. The wireless network jamming problem subject to protocol interference
    Hugh R. Medal. Networks 67(2), 111–125
    Publication Year: 2016
    [PDF]   [Link to Article] Abstract
  23. A Bi-objective Analysis of the R-All-Neighbor P-Center Problem
    Hugh R. Medal, Chase E. Rainwater, Edward A. Pohl, Manuel D. Rossetti. Computers & Industrial Engineering, Volume 72, Pages 114–128
    Publication Year: 2014
    [PDF]   [Link to Article] Abstract
  24. A Multi-objective Integrated Facility Location-Hardening Model: Analyzing the Pre- and Post-Disruption Tradeoff
    Hugh R. Medal, Edward A. Pohl, Manuel D. Rossetti. European Journal of Operational Research, Volume 237, 257– 270
    Publication Year: 2014
    [PDF]   [Link to Article] Abstract
  25. Robust Facility Location: Hedging Against Failures
    Ivan Hernandez, Jose Emmanuel Ramirez-Marquez, Chase Rainwater, Edward Pohl, Hugh Medal. Reliability Engineering & System Safety, Volume 123, Pages 73–80
    Publication Year: 2014
    [PDF]   [Link to Article] Abstract
  26. Vulnerability Assessment and Re-routing of Freight Trains Under Disruptions: A Coal Supply Chain Network Application
    Ridvan Gedik, Hugh Medal, Chase Rainwater, Ed A. Pohl, Scott J. Mason. Transportation Research Part E, Volume 71, 45–57
    Publication Year: 2014
    [PDF]   [Link to Article] Abstract
  27. Models for reducing the risk of critical networked infrastructures
    Hugh Medal, Stevenson J. Sharp, Ed Pohl, Chase Rainwater, Scott J. Mason. International Journal of Risk Assessment and Management, Volume 15 (No. 2/3), Pages 99-127
    Publication Year: 2011
    [PDF]   [Link to Article] Abstract

Working Drafts

  1. A stochastic programming model with endogenous uncertainty for proactive supplier risk mitigation of low-volume-high-value manufacturers considering decision-dependent supplier performance.
    Rui Zhou, Bhuiyan, Tanveer Hossain, Michael Sherwin, and Medal, H. (2020). Tech. rep. Knoxville, TN: University of Tennessee - Knoxville.
    Publication Year: 2020 [Link to Article]
  2. Predicting Supplier Reliability in a Low Volume High Value Supply Chain Using Machine Learning.
    Mike Sherwin, Medal, H., and C Mackenzie (2020). Tech. rep. Knoxville, TN: University of Tennessee.
    Publication Year: 2020
  3. Initial Orbit Selection For Forest Fire Monitoring with Descending Pass Observations.
    Hoskins, A. and Medal, H. (2020). Tech. rep. Knoxville, TN: University of Tennessee - Knoxville.
    Publication Year: 2020
  4. Risk-averse Bi-level Stochastic Network Interdiction Model for Cyber-security.
    Bhuiyan, T. H., Nandi, A. K., Medal, H., and M Halappanavar (2019). Tech. rep. Knoxville, TN: University of Tennessee.
    Publication Year: 2020
  5. Computing the Vulnerability of Multi-Hop Wireless Networks: A Search for the Best Interference Model
    Medal, H. and Schweitzer, D. Tech. rep. Starkville, MS: Mississippi State University.
    Publication Year: 2017
  6. Network interdiction model for cyber security against bounded rational attacker
    Nandi, A. K., M. Halappanavar, Medal, H., and Bhuiyan, T. H. Tec
    Publication Year: 2017
  7. Risk-averse Bi-level Stochastic Network Interdiction Model for Cyber-security
    Bhuiyan, T. H., Nandi, A. K., Medal, H., and M. Halappanavar Tech. rep. Starkville, MS: Mississippi State University.
    Publication Year: 2017 [PDF]   [Link to Article]
  8. Using DoDAF attack scenarios to develop Attacker-Defender Bi-level Mixed Integer Programming Models: A Wireless Network Jamming Application
    Huff, J. D., Leonard, W., Stallcup, R., and Medal, H. Tech. rep. Starkville, MS: Mississippi State University.
    Publication Year: 2017

Under Review

  1. A Model-Based Systems Engineering Approach to Critical Infrastructure Vulnerability Assessment and Decision Analysis.
    Huff, J. D., Medal, H., and K. A. Griendling Submitted to Systems Engineering 22(2), 114–133.
    Publication Year: 2019 [Link to Article]
  2. NATO Human View Executable Architectures for Critical Infrastructure Analysis.
    Huff, J. D., Leonard, W., B. Smith, K. Griendling, and Medal, H. Engineering Management Journal. 31:4, 224-245.
    Publication Year: 2019 [Link to Article]
  3. An attacker-defender model for analyzing the vulnerability of initial attack in wildfire suppression
    Rashidi, E., Medal, H., and Hoskins, A. Submitted to Naval Research Logistics 65(2), 120–134.
    Publication Year: 2018

Under Revision

  1. A Multi-modal User Equilibrium Traffic Assignment with Network Expansion
    Parsafard, M., Rashidi, E., X. Li, and Medal, H.
    Publication Year: 2016

Peer-reviewed Conference Papers

  1. A Visual Evaluation Study of Graph Sampling Techniques.
    Zhang, Fangyan; Zhang, Song; Chung Wong, Pak; Medal, Hugh; Bian, Linkan; Swan II, J. Edward; Jankun-Kelly, T.J. Proceedings of the 7th annual IS&T International Symposium on Electronic Imaging 2017, no. 1 (2017): 110-117. Atlanta, GA.
    Publication Year: 2017 [Link to Article]
  2. Analyzing the Vulnerability of a Single-Hop Wireless Network Grid
    Schweitzer, D., Jafari, R., and Medal, H. Proceedings of the Industrial and Systems Engineering Research Conference. Anaheim, CA, United States.
    Publication Year: 2016
  3. Information diffusion in social networks with individual time constraints
    Rashidi, E. and Medal, H. Proceedings of the Industrial and Systems Engineering Research Conference. Anaheim, CA, United States.
    Publication Year: 2016
  4. A Stochastic Programming Approach to Satellite Wildfire Observations
    Hoskins, A. and Medal, H. Proceedings of the Industrial and Systems Engineering Research Conference. Anaheim, CA, United States.
    Publication Year: 2016
  5. Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success
    Bhuiyan, T. H., Nandi, A. K., Medal, H., and M. Halappanavar Accepted for publication in IEEE International Conference on Technologies for Homeland Security. Waltham, Massachusetts, USA
    Publication Year: 2016
  6. Students’ Experiences with an Open-ended Client Project in a Graduate Course
    Heier-Stamm, J, R Burch, and Medal, H. Proceedings of the 112nd ASEE Annual Conference and Exposition. Seattle, Washington, USA.
    Publication Year: 2015
  7. A Bi-Level Programming Model for the Wireless Network Jamming Placement Problem.
    Satish Vadlamani, Hugh Medal, Burak Ekşioğlu, Pan Li Proceedings of the 2014 Industrial and Systems Engineering Research Conference
    Publication Year: 2014 [PDF]  
  8. A Network Design Model under Connectivity Constraints with Heterogeneous Services
    Li, X., Medal, H., and Wang, J. Proceedings of the 2014 Transportation Research Board Conference. Washington, D.C.
    Publication Year: 2014
  9. Link removal models for minimizing the spread of infections in a network.
    Nandi, A. K. and Medal, H. In: Proceedings of the 8th INFORMS Workshop on Data Mining and Health Informatics (DM-HI 2013). Ed. by O Seref, N Serban, and D Zeng. INFORMS.
    Publication Year: 2013
  10. A Software Tool for Intermittent Demand Analysis
    Medal, H., M. D. Rossetti, Varghese, V.M., and E. A. Pohl 2009 Industrial Engineering Research Conference. Ed. by J. C. Smith and J. Geunes. Miami, Florida, pp.1658–1663 (CD)
    Publication Year: 2009
  11. Pickup and Delivery of Poultry in Rural Networks.
    Medal, H., S. J. Gade, D.and Mason, R. D. Meller, and E. A. Pohl 2008 Industrial Engineering Research Conference. Ed. by J. Fowler and S. Mason. Vancouver, Canada, pp.1897–1902
    Publication Year: 2008

Book Chapters

  1. Security in Wireless Networks: An Operations Research Oriented Tutorial
    Satish Vadlamani, Hugh Medal, Burak Ekşioğlu, Pan Li NATO Science for Peace and Security, Volume 37, Pages 272–288
    Publication Year: 2014 [PDF]   [Link to Article]

Dissertation

  1. Locating and Protecting Facilities Subject to Random Disruptions and Attacks
    Hugh Medal PhD thesis. Fayetteville, Arkansas: University of Arkansas.
    Publication Year: 2012 [PDF]