default search action
Search dblp for Publications
export results for "Satish Vadlamani"
@article{DBLP:journals/cor/VadlamaniSMNE18, author = {Satish Vadlamani and David Schweitzer and Hugh R. Medal and Apurba K. Nandi and Burak Eksioglu}, title = {A mixed-integer programming approach for locating jamming devices in a flow-jamming attack}, journal = {Comput. Oper. Res.}, volume = {95}, pages = {83--96}, year = {2018}, url = {https://doi.org/10.1016/j.cor.2018.02.020}, doi = {10.1016/J.COR.2018.02.020}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cor/VadlamaniSMNE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cor/NandiMV16, author = {Apurba K. Nandi and Hugh R. Medal and Satish Vadlamani}, title = {Interdicting attack graphs to protect organizations from cyber attacks: {A} bi-level defender-attacker model}, journal = {Comput. Oper. Res.}, volume = {75}, pages = {118--131}, year = {2016}, url = {https://doi.org/10.1016/j.cor.2016.05.005}, doi = {10.1016/J.COR.2016.05.005}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cor/NandiMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/HosseiniKV14, author = {Seyedmohsen Hosseini and Abdullah Al Khaled and Satish Vadlamani}, title = {Hybrid imperialist competitive algorithm, variable neighborhood search, and simulated annealing for dynamic facility layout problem}, journal = {Neural Comput. Appl.}, volume = {25}, number = {7-8}, pages = {1871--1885}, year = {2014}, url = {https://doi.org/10.1007/s00521-014-1678-x}, doi = {10.1007/S00521-014-1678-X}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/HosseiniKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/natosec/VadlamaniME14, author = {Satish Vadlamani and Hugh R. Medal and Burak Eksioglu}, editor = {Sergiy Butenko and Eduardo L. Pasiliao and Volodymyr Shylo}, title = {Security in Wireless Networks: {A} Tutorial}, booktitle = {Examining Robustness and Vulnerability of Networked Systems}, series = {{NATO} Science for Peace and Security Series, {D:} Information and Communication Security}, volume = {37}, pages = {272--288}, publisher = {{IOS} Press}, year = {2014}, url = {https://doi.org/10.3233/978-1-61499-391-9-272}, doi = {10.3233/978-1-61499-391-9-272}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/natosec/VadlamaniME14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/CaryHMKPSVCERPGBMZ10, author = {John R. Cary and Ammar Hakim and Mahmood Miah and Scott Kruger and Alexander Pletzer and Svetlana G. Shasharina and Srinath Vadlamani and Ronald H. Cohen and Thomas Epperly and Thomas D. Rognlien and Alexei Pankin and Richard Groebner and Satish Balay and Lois C. McInnes and Hong Zhang}, editor = {Marco Danelutto and Julien Bourgeois and Tom Gross}, title = {{FACETS}}, booktitle = {Proceedings of the 18th Euromicro Conference on Parallel, Distributed and Network-based Processing, {PDP} 2010, Pisa, Italy, February 17-19, 2010}, pages = {435--442}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/PDP.2010.83}, doi = {10.1109/PDP.2010.83}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdp/CaryHMKPSVCERPGBMZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.