Publications of the HPC²
Publications by HPC centers and institutes include items from past years such as an early publication written by one of the HPC founding investigators, Dr. Joe Thompson. Numerical Grid Generation was originally published by Elsevier Science Publishing Co., Inc. in 1985, and the copyright was transferred to Joe F. Thompson in 1997.
Publications for: Medal
Nandi, A., Medal, H., & Vadlamani, S. (2016). Interdicting Attack Graphs to Protect Organizations from Cyber Attacks: a Bi-level Defender-attacker Model. Computers and Operations Research. 75, 118-131.
Nandi, A. K., & Medal, H. (2016). Models for Removing Links in a Network to Minimize the Spread of Infections. Computers and Operations Research. 69, 10-24. DOI:10.1016/j.cor.2015.11.001.
Rashidi, E., Parsaford, M., Medal, H., & Li, X. (2016). Optimal Traffic Calming: A Mixed-integer Bi-level Programming Model for Locating Sidewalks and Crosswalks in a Multimodal Transportation Network to Maximize Pedestrians' Safety and Network Usability. Transportation Research Part E. 91, 33-50.
Medal, H. (2016). The wireless network jamming problem subject to protocol interference. Networks. 67(2), 111-125. DOI:10.1002/net.21664. [Document Site]
Vadlamani, S., Eksioglu, B., Medal, H., & Nandi, A. (2016). Jamming Attacks on Wireless Networks: A Comprehensive Taxonomical Survey. International Journal of Production Economics. 172, 76-94. DOI:10.1016/j.ijpe.2015.11.008.
Medal, H., Pohl, E., & Rossetti, M. (2016). Allocating Protection Resources to Facilities When the Effect of Protection Is Uncertain. IIE Transactions. 48(3), 220-234. DOI:10.1080/0740817X.2015.1078013.
Sherwin, M., Medal, H., & Lapp, S. (2016). Proactive Cost-Effective Identification and Mitigation of Supply Delay Risks in a Low Volume High Value Supply Chain Using Fault-Tree Analysis. International Journal of Production Economics. 175, 153-163.
Peer-Reviewed Conference Abstracts
Bhuiyan, T., Nandi, A., & Medal, H. (2016). Minimizing Expected Maximum Risk from Cyber-attacks with Probabilistic Attack Success. 2016 IEEE International Conference on Technologies for Homeland Security. Waltham, MA.
Peer-Reviewed Conference Papers
Rashidi, E., & Medal, H. (2016). Information Diffusion in Social Networks with Individual Time Constraints. Proceedings of the Industrial and Systems Engineering Research Conference. Anaheim, CA.
Schweitzer, D., Jafari Marandi, R., & Medal, H. (2016). Analyzing the Vulnerability of a Single-Hop Wireless Network Grid. Proceedings of the Industrial and Systems Engineering Research Conference. Anaheim, CA.
Bhuiyan, T., Nandi, A., Medal, H., & Halappanavar, M. (2016). Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success. 2016 IEEE International Symposium onTechnologies for Homeland Security. Waltham, MA.
Hoskins, A., & Medal, H. (2016). A Stochastic Programming Approach to Satellite Wildfire Observations. Proceedings of the Industrial and Systems Engineering Research Conference. Anaheim, CA, United States.
News | Events | Jobs | Intranet (Restricted access)
Mississippi State University is an equal opportunity institution.