default search action
Jomon Aliyas Paul
Person information
- affiliation: Kennesaw State University, Kennesaw, Georgia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Leo MacDonald, Jomon Aliyas Paul:
A risk analytics model for strategic workforce planning: readiness of enlisted military personnel. Ann. Oper. Res. 338(1): 513-533 (2024) - [j18]Stuart Napshin, Jomon Aliyas Paul, Justin D. Cochran:
Individual Responsibility Around Deepfakes: It's No Laughing Matter. Cyberpsychology Behav. Soc. Netw. 27(2): 105-110 (2024) - [j17]Jomon Aliyas Paul, Minjiao Zhang, Muer Yang, Chong Xu:
Improving disaster relief plans for hurricanes with social media. J. Oper. Res. Soc. 75(10): 1965-1978 (2024) - 2022
- [j16]Timothy Mathews, Jomon Aliyas Paul:
Natural disasters and their impact on cooperation against a common enemy. Eur. J. Oper. Res. 303(3): 1417-1428 (2022) - 2021
- [j15]Aniruddha Bagchi, Jomon Aliyas Paul:
National security vs. human rights: A game theoretic analysis of the tension between these objectives. Eur. J. Oper. Res. 290(2): 790-805 (2021) - [j14]Jomon Aliyas Paul, Minjiao Zhang:
Decision support model for cybersecurity risk planning: A two-stage stochastic programming framework featuring firms, government, and attacker. Eur. J. Oper. Res. 291(1): 349-364 (2021) - 2020
- [j13]Jomon Aliyas Paul:
Development and Measurement Validity of a Social Media Activity Instrument. Commun. Assoc. Inf. Syst. 47: 3 (2020)
2010 – 2019
- 2019
- [j12]Jomon Aliyas Paul, Aniruddha Bagchi:
Civil Liberties and Terrorism in Middle East, North Africa, Afghanistan, and Pakistan. Ann. Oper. Res. 275(2): 623-651 (2019) - [j11]Jomon Aliyas Paul, Xinfang (Jocelyn) Wang:
Socially optimal IT investment for cybersecurity. Decis. Support Syst. 122 (2019) - [j10]Jomon Aliyas Paul, Minjiao Zhang:
Supply location and transportation planning for hurricanes: A two-stage stochastic programming framework. Eur. J. Oper. Res. 274(1): 108-125 (2019) - 2017
- [j9]Aniruddha Bagchi, Jomon Aliyas Paul:
Espionage and the optimal standard of the Customs-Trade Partnership against Terrorism (C-TPAT) program in maritime security. Eur. J. Oper. Res. 262(1): 89-107 (2017) - 2016
- [j8]Jomon Aliyas Paul, Leo MacDonald:
Location and capacity allocations decisions to mitigate the impacts of unexpected disasters. Eur. J. Oper. Res. 251(1): 252-263 (2016) - 2015
- [j7]Jomon Aliyas Paul, Leo MacDonald:
A Teaching Supplement on Sensitivity Analysis for Linear Programming in Undergraduate Business Programs. INFORMS Trans. Educ. 16(1): 6-14 (2015) - 2014
- [j6]Aniruddha Bagchi, Jomon Aliyas Paul:
Optimal Allocation of Resources in Airport Security: Profiling vs. Screening. Oper. Res. 62(2): 219-233 (2014) - 2013
- [j5]Abhra Roy, Jomon Aliyas Paul:
Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption. Ann. Oper. Res. 211(1): 399-432 (2013) - [j4]Jomon Aliyas Paul, Arun Jotshi:
Efficient operating room redesign through process improvement and optimal management of scheduled and emergent surgeries. Int. J. Math. Oper. Res. 5(3): 317-344 (2013) - [j3]Jomon Aliyas Paul, Leo MacDonald:
Determination of number of dedicated OR's and supporting pricing mechanisms for emergent surgeries. J. Oper. Res. Soc. 64(6): 912-924 (2013) - 2012
- [j2]Jomon Aliyas Paul, Govind Hariharan:
Location-allocation planning of stockpiles for effective disaster mitigation. Ann. Oper. Res. 196(1): 469-490 (2012) - [j1]Jomon Aliyas Paul, Hope M. Baker, Justin D. Cochran:
Effect of online social networking on student academic performance. Comput. Hum. Behav. 28(6): 2117-2127 (2012)
2000 – 2009
- 2007
- [c1]Jomon Aliyas Paul, Govind Hariharan:
Hospital capacity planning for efficient disaster mitigation during a bioterrorist attack. WSC 2007: 1139-1147
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint