Content
October 2020, Volume 17, Issue 4
- 435-446 Resilience in engineered resilient systems
by Randy K Buchanan & Simon R Goerger & Christina H Rinaudo & Greg Parnell & Adam Ross & Valerie Sitterle - 447-456 Use of an aerial reconnaissance model during the movement of oversized loads
by Jan Drozd & Jiřà Neubauer
July 2020, Volume 17, Issue 3
- 231-233 Introduction to special issue on forecasting in the social sciences for national security
by Ryan G Baird - 235-242 A Bayesian forecasting model of international conflict
by George W Williford & Douglas B Atkinson - 243-267 Predictive models of world conflict: accounting for regional and conflict-state differences
by Nicholas J Shallcross & Darryl K Ahner - 269-283 Forecasting violent events in the Middle East and North Africa using the Hidden Markov Model and regularized autoregressive models
by KSM Tozammel Hossain & Shuyang Gao & Brendan Kennedy & Aram Galstyan & Prem Natarajan - 285-308 Predicting the costs of war
by Phil Henrickson - 309-324 The opportunity cost of intrastate violence and the out-of-sample validity of commodity price shocks
by Spencer Dorsey
April 2020, Volume 17, Issue 2
- 125-136 Research on the computing method for the forming velocity of circumferential multiple explosive formed projectiles
by Zhen-gang Liang & Bai-xu Chen & Yu-xiang Nan & Jian-wei Jiang & Li Ding - 137-142 Cognition, conflict, and doctrine: How groupthink fails on a Clausewitz landscape
by Rodrick Wallace - 143-153 Contrasting tactical and strategic dynamics on a Clausewitz landscape
by Rodrick Wallace - 155-173 Rapid prototyping of cognitive agent simulations using C-BML transformations
by Okan Topçu & Levent Yilmaz - 175-189 Behaving socially with a virtual human role-player in a simulated counseling session
by John L Hart & Michael D Proctor - 191-204 An operational effectiveness analysis of legacy and future mine countermeasures systems using discrete event simulation
by Paul Beery & Timothy Byram & Eric Gatley & Kristin Giammarco & Richard Williams & Eugene Paulo - 205-211 Ensembles of classifiers for improved SAR image recognition using pseudo Zernike moments
by Pouya Bolourchi & Masoud Moradi & Hasan Demirel & Sener Uysal - 213-225 Assessment of Structure from Motion for reconnaissance augmentation and bandwidth usage reduction
by Jonathan Roeber & Scott Nykl & Scott Graham - 227-227 Thanks to reviewers
by N/A
January 2020, Volume 17, Issue 1
- 3-4 Modeling and simulation to support cyber defense
by Suresh K Damodaran & Neal Wagner - 5-19 Models for restoration decision making for a supply chain network after a cyber attack
by Emily A Heath & John E Mitchell & Thomas C Sharkey - 21-38 The game-theoretic model and experimental investigation of cyber wargaming
by Edward JM Colbert & Alexander Kott & Lawrence P Knachel - 39-46 Assessing the cognitive complexity of cyber range environments
by Antonio Roque & Douglas Stetson & Daniel J Hannon - 47-49 Future challenges for cyber simulation
by Martin R Stytz & Sheila B Banks - 51-54 An introductory preview of Autonomous Intelligent Cyber-defense Agent reference architecture, release 2.0
by Alexander Kott & Paul Théron & Luigi V Mancini & Edlira Dushku & Agostino Panico & Martin Drašar & Benoît LeBlanc & Paul Losiewicz & Alessandro Guarino & Mauno Pihelgas & Krzysztof Rzadca - 55-81 Inventory routing for defense: Moving supplies in adversarial and partially observable environments
by Michelle Blom & Slava Shekh & Don Gossink & Tim Miller & Adrian R Pearce - 83-97 Response surface modeling of precision-guided fragmentation munitions
by Darryl Ahner & Andrew McCarthy - 99-116 Concept development for comprehensive operations support with modeling and simulation
by Guido A Veldhuis & Nico M de Reus & Bas MJ Keijser - 117-122 Optimization in an asymmetric Lanchester (n, 1) model
by Manh D Hy & My A Vu & Nam H Nguyen & Anh N Ta & Dinh V Bui
October 2019, Volume 16, Issue 4
- 251-253 Operation Assessment: fundamentals and best practices to create a baseline for assessors (J18-1)
by Lynette MB Arnhart & Marvin L King III & Jonathan Schroden - 255-263 Assessing the theory of change in national strategies
by Cathryn Quantic Thurston - 265-276 Design, assessment, and the causal imperative in complex operations and campaigns
by Christopher J Hickey & Robert Bradford & Celestino Perez - 277-284 Development of composite indices and a regional assessment framework for analyzing nation-state health
by Darryl K Ahner & Jennifer L Thompson & Karleine M Justice - 285-295 Effective Use of Public Perceptions in Assessments
by Joseph Lindquist & David Peng & Shawnette Rochelle & Dusty Turner & Matt Warshaw - 297-304 Operation assessment: Lessons learned across echelons
by James A Jablonski & Brian M Wade & Jonathan K Alt - 305-322 Evaluation theory and its application to military assessments
by Andrew Keith & Darryl Ahner & Nicole Curtis - 323-324 Journal of Defense Modeling and Simulation (JDMS) special issue: Transforming the engineering enterprise—applications of Digital Engineering and Modular Open Systems Approach
by Kristen Baldwin - 325-338 Digital engineering transformation across the Department of Defense
by Phil Zimmerman & Tracee Gilbert & Frank Salvatore - 339-355 Transforming systems engineering through digital engineering
by Mary A Bone & Mark R Blackburn & Donna H Rhodes & David N Cohen & Jaime A Guerrero - 357-371 CREATE/ERS: Department of Defense acquisition reform through resilient engineering and virtual prototyping in a digital environment
by Douglass E Post & Owen J Eslinger & Scott M Sundt & Megan Holland - 373-388 Considerations and examples of a modular open systems approach in defense systems
by Philomena Zimmerman & Monique Ofori & Donald Barrett & Joseph Soler & Anthony Harriman - 389-401 Modularity research to guide MOSA implementation
by Navindran Davendralingam & Cesare Guariniello & Shashank Tamaskar & Daniel DeLaurentis & Mitchell Kerman
July 2019, Volume 16, Issue 3
- 219-231 Supporting after action review in simulator mission training: Co-creating visualization concepts for training of fast-jet fighter pilots
by Sanna Aronsson & Henrik Artman & Sinna Lindquist & Mikael Mitchell & Tomas Persson & Robert Ramberg & Mario Romero & Pontus ter Vehn - 233-254 Constraint programming heuristics and software tools for amphibious embarkation planning
by Paul A Chircop & Timothy J Surendonk - 255-271 Dynamic synthetic environments: a survey
by Ruben Smelik & Freek van Wermeskerken & Robbert Krijnen & Frido Kuijper - 273-282 A study of assorted data on suicide bombings in Pakistan
by Sana Rasheed & Noman Khalid - 283-295 New algorithms for predicting longitudinal motion resistance of wheels on dry sand
by James M Williams & Farshid Vahedifard & George L Mason & Jody D Priddy - 297-320 A Monte Carlo tradeoff analysis to guide resource investment in threat detection systems: From forensic to prospective investigations
by Shelley Cazares & Jeffrey A Snyder & Joan Cartier & Felicia Sallis-Peterson & John Fregeau - 321-333 Prioritizing investment in military cyber capability using risk analysis
by Cayt Rowe & Hossein Seif Zadeh & Ivan L. Garanovich & Li Jiang & Daniel Bilusich & Rick Nunes-Vaz & Anthony Ween - 335-345 Framing cyber warfare: an analyst’s perspective
by Anthony Ween & Peter Dortmans & Nitin Thakur & Cayt Rowe - 347-347 WITHDRAWN (duplicate publication): Deterring the development and use of nuclear weapons: A multi-level modeling approach
by N/A
April 2019, Volume 16, Issue 2
- 91-101 Modeling of situation assessment in regional air defense combat
by Hai-yan Yang & Shuai-wen Zhang & Xu-yu Li - 103-117 A multi-objective optimization of ballistic and cruise missile fire plans based on damage calculations from missile impacts on an airfield defended by an air defense artillery network
by Brian M Wade - 119-136 Securing unmanned autonomous systems from cyber threats
by Bharat B Madan & Manoj Banik & Doina Bein - 137-144 Research on the burst height measurement method based on the missile-borne millimeter wave detector
by Cheng Cheng & Min Gao & Xiaodong Zhou & Jiacheng Li - 145-157 Multi-objective optimization using parallel simulation for space situational awareness
by Michael S Felten & John M Colombi & Richard G Cobb & David W Meyer - 159-174 Design and evaluation of an avatar-based cultural training system
by Donald E. Brown & Anne Moenning & Stephanie Guerlain & Benton Turnbull & Daniel Abel & Christine Meyer - 175-189 Mitigating the effects of boom occlusion on automated aerial refueling through shadow volumes
by Zachary Paulson & Scott Nykl & John Pecarina & Brian Woolley - 191-205 US Army performance appraisal policy analysis: a simulation optimization approach
by Lee A Evans & Ki-Hwan G Bae - 207-215 Analytics for awareness in maritime surveillance: from data to tactical insight
by Terry Caelli & Joyanto Mukerjee & Evan Sparks
January 2019, Volume 16, Issue 1
- 3-4 Modeling and simulation of quantum information, quantum communication, and quantum key distribution (QKD) systems
by Michael R Grimaila - 5-13 A model to estimate performance of space-based quantum communication protocols including quantum key distribution systems
by Jonathan C Denton & Douglas D Hodson & Richard G Cobb & Logan O Mailloux & Michael R Grimaila & Gerald Baumgartner - 15-26 Modeling quantum optics for quantum key distribution system simulation
by Douglas D Hodson & Michael R Grimaila & Logan O Mailloux & Colin V McLaughlin & Gerald Baumgartner - 27-44 Implementing the decoy state protocol in a practically oriented Quantum Key Distribution system-level model
by Ryan D Engle & Logan O Mailloux & Michael R Grimaila & Douglas D Hodson & Colin V McLaughlin & Gerald Baumgartner - 45-56 A module-based simulation framework to facilitate the modeling of Quantum Key Distribution system post-processing functionalities
by Ryan D Engle & Douglas D Hodson & Logan O Mailloux & Michael R Grimaila & Colin V McLaughlin & Gerald Baumgartner - 57-65 A quantum algorithm for uniform sampling of models of propositional logic based on quantum probability
by Radhakrishnan Balu & Dale Shires & Raju Namburu - 67-77 OpenFlow arbitrated programmable network channels for managing quantum metadata
by Venkat R Dasari & Travis S Humble - 79-88 Threatcasting: a framework and process to model future operating environments
by Natalie Vanatta & Brian David Johnson
October 2018, Volume 15, Issue 4
- 369-381 Modeling the behavior of a hierarchy of command agents with context-based reasoning
by Rikke Amilde Løvlid & Solveig Bruvoll & Karsten Brathen & Avelino Gonzalez - 383-397 Leveraging a design of experiments methodology to enhance impacts of modeling and simulations for engineered resilient systems
by Alex D MacCalman & Simon R Goerger - 399-413 Estimating Ricochet Hazard Zones at Sea
by Ramzi Mirshak & Talia Beech - 415-435 Understanding climate-induced migration through computational modeling: A critical overview with guidance for future efforts
by Charlotte Till & Jamie Haverkamp & Devin White & Budhendra Bhaduri - 437-447 Rapid Operational Access and Maneuver Support platform for military logistics and operation planning in water environments
by Drew Allan Loney & Kimberly Collins Pevey & Jennifer Tate McAlpin & Benjamin Wright Nelsen & Brent Harry Hargis - 449-460 Multi-objective mapping of full-mission simulators on heterogeneous distributed multi-processor systems
by Rabeh Ayari & Imane Hafnaoui & Alexandra Aguiar & Patricia Gilbert & Michel Galibois & Jean-Pierre Rousseau & Giovanni Beltrame & Gabriela Nicolescu - 461-469 Obtaining a cross-engineering collaborative environment via transition to a model-based system engineering (MBSE) approach
by Jane T Bachman - 471-481 A method of assessing the time-variant value of multi-domain architectures
by Thomas Ford & David Meyer & John Colombi & Brian Scheller & Cody Palmer - 483-493 Deterring the development and use of nuclear weapons: a multi-level modeling approach
by Kathleen M Carley & Geoffrey P Morgan & Michael J Lanham - 495-498 The role of approximate morphisms in multiresolution modeling: Can we relax the strict lumpability requirements?
by Bernard P Zeigler - 499-499 Reviewer thank you list
by N/A
July 2018, Volume 15, Issue 3
- 257-267 Development and validation of a biofidelic head form model to assess blast-induced traumatic brain injury
by Devon Downes & Amal Bouamoul & Simon Ouellet & Manouchehr Nejad Ensan - 269-278 Battle damage assessment of surface warship formation based on improved gray relational analysis
by Zhuojie Xie & Yuhui Wang & Qingxian Wu - 279-288 Better analysis using the models and simulations hierarchy
by Mark A Gallagher & Daniel V Hackman & Alisha A Lad - 289-301 Optimal strategy for target protection with a defender in the pursuit-evasion scenario
by Qilong Sun & Naiming Qi & Mingying Huo - 303-322 Evolutionary sensor allocation for the Space Surveillance Network
by Gabriel H Greve & Kenneth M Hopkinson & Gary B Lamont - 323-336 Methodology for targeting analysis for minimal response
by W. P. Fox & J. Hansberger - 337-349 Profile of modeling and simulation research published in the Journal of Defense Modeling and Simulation
by Navonil Mustafee & Korina Katsaliaki & Thibaut Le Forsonney & Saikou Diallio - 351-364 Dynamic response for shock loadings and stress analysis of a trajectory correcting fuse based on fuse–projectile–barrel coupling
by Jianghai Hui & Min Gao & Xinpeng Li
April 2018, Volume 15, Issue 2
- 125-125 Introduction to the second part of the special issue on model-driven paradigms for integrated approaches to cyber defense
by Alexander Kott - 127-146 A game theoretic approach to cyber security risk management
by Scott Musman & Andrew Turner - 147-160 Cyber defense in breadth: Modeling and analysis of integrated defense systems
by Jin-Hee Cho & Noam Ben-Asher - 161-180 Comparative analysis and patch optimization using the cyber security analytics framework
by Subil Abraham & Suku Nair - 181-204 Selection of countermeasures against network attacks based on dynamical calculation of security metrics
by Igor Kotenko & Elena Doynikova - 205-218 An agent-based modeling framework for cybersecurity in mobile tactical networks
by Brian Thompson & James Morris-King - 219-230 Proactive routing mutation against stealthy Distributed Denial of Service attacks: metrics, modeling, and analysis
by Qi Duan & Ehab Al-Shaer & Samrat Chatterjee & Mahantesh Halappanavar & Christopher Oehmen - 231-244 Historical operational data analysis for defence preparedness planning
by Kamran Shafi & Essam Debie & David Oliver - 245-254 Programmable control plane for mission critical wireless networks
by Venkat R Dasari & Brian Jalaian & Saleil Bhat
January 2018, Volume 15, Issue 1
- 3-4 The significance of model-driven paradigms in cyber security: an introduction
by Alexander Kott - 5-12 The protoscience of cybersecurity
by Eric N Hatleback - 13-29 Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach
by Stephen Moskal & Shanchieh Jay Yang & Michael E Kuhl - 31-48 Malware modeling and experimentation through parameterized behavior
by Z. Berkay Celik & Patrick McDaniel & Thomas Bowen - 49-63 Statistical models for the number of successful cyber intrusions
by Nandi O Leslie & Richard E Harang & Lawrence P Knachel & Alexander Kott - 65-77 Validation of the finite state machine model for network simulation and a proposed testbed
by Scott Brown & Harold Brown - 79-93 A Graphical Model to Assess the Impact of Multi-Step Attacks
by Massimiliano Albanese & Sushil Jajodia - 95-109 Understanding and taxonomy of uncertainty in modeling, simulation, and risk profiling for border control automation
by Svetlana N Yanushkevich & Shawn C Eastwood & Martin Drahansky & Vlad P Shmerko - 111-120 CARVER 2.0: integrating the Analytical Hierarchy Process’s multi-attribute decision-making weighting scheme for a center of gravity vulnerability analysis for US Special Operations Forces
by Bradley Greaver & Leo Raabe & William P Fox & Robert E Burks - 121-122 Call for papers: Special Issue Modeling and Simulation to Support Cyber Defense (J17-3)
by N/A