The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
Table of contents
- 3
-
Cyber risk and vulnerability estimationCam, Hasan et al. | 2022
- 5
-
Complexity and mission computability of adaptive computing systemsDasari, Venkat R / Im, Mee Seong / Geerhart, Billy et al. | 2022
- 13
-
Vulnerability Selection for Remediation: An Empirical AnalysisShah, Ankit / Farris, Katheryn A. / Ganesan, Rajesh et al. | 2022
- 23
-
Cybersecurity threats and experimental testbed for a generator systemWerth, Aaron W / Griffith, SueAnne N / Hairston, Jesse R et al. | 2022
- 37
-
Estimation of cyber network risk using rare event simulationKrall, Alexander L / Kuhl, Michael E / Yang, Shanchieh J et al. | 2022
- 57
-
Machine learning in cybersecurity: a comprehensive surveyDasgupta, Dipankar / Akhtar, Zahid / Sen, Sajib et al. | 2022
- 107
-
Agent-based target evaluation and fire doctrine: an aspect-oriented programming viewHocaoğlu, Mehmet Fatih et al. | 2022