Jamming attacks on wireless networks: A taxonomic survey S Vadlamani, B Eksioglu, H Medal, A Nandi International Journal of Production Economics 172, 76-94, 2016 | 150 | 2016 |
Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender–attacker model AK Nandi, HR Medal, S Vadlamani Computers & Operations Research 75, 118-131, 2016 | 77 | 2016 |
Methods for removing links in a network to minimize the spread of infections AK Nandi, HR Medal Computers & Operations Research 69, 10-24, 2016 | 69 | 2016 |
Driver behavior and accident frequency in school zones: Assessing the impact of sign saturation L Strawderman, MM Rahman, Y Huang, A Nandi Accident Analysis & Prevention 82, 118-125, 2015 | 42 | 2015 |
Minimizing expected maximum risk from cyber-attacks with probabilistic attack success TH Bhuiyan, AK Nandi, H Medal, M Halappanavar 2016 IEEE Symposium on Technologies for Homeland Security (HST), 1-6, 2016 | 23 | 2016 |
Risk-Averse Bi-Level Stochastic Network Interdiction Model for Cyber-Security Risk Management TH Bhuiyan, HR Medal, AK Nandi, M Halappanavar International Journal of Critical Infrastructure Protection, 100408, 2021 | 17 | 2021 |
Accelerating the mining of influential nodes in complex networks through community detection M Halappanavar, AV Sathanur, AK Nandi Proceedings of the ACM International Conference on Computing Frontiers, 64-71, 2016 | 14 | 2016 |
A mixed-integer programming approach for locating jamming devices in a flow-jamming attack S Vadlamani, D Schweitzer, H Medal, A Nandi, B Eksioglu Computers & Operations Research 95, 83-96, 2018 | 7 | 2018 |
Network interdiction models and algorithms for information security AK Nandi Mississippi State University, 2016 | | 2016 |