The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
Table of contents
- 197
-
Special issue: Cyber modeling and simulationMcDonald, J Todd / Andel, Todd R / Petty, Mikel D et al. | 2017
- 201
-
Quantifying the mission impact of network-level cyber defensive mitigationsWagner, Neal / Şahin, Cem Ş / Winterrose, Michael et al. | 2017
- 217
-
Feature extraction and feature selection for classifying cyber traffic threatsMoore, Kristy L / Bihl, Trevor J / Bauer, Kenneth W et al. | 2017
- 233
-
Markov Chain modeling of cyber threatsGore, Ross / Padilla, Jose / Diallo, Saikou et al. | 2017
- 245
-
Modeling information flow for an autonomous agent to support reverse engineering workSisco, Zachary D / Dudenhofer, Patrick P / Bryant, Adam R et al. | 2017
- 257
-
Attrition rates and maneuver in agent-based simulation modelsOrmrod, David / Turnbull, Benjamin et al. | 2017
- 273
-
Legendre spectral-collocation method for solving fractional optimal control of HIV infection of CD4+T cells mathematical modelSweilam, Nasser H / Al-Mekhlafi, Seham M et al. | 2017
- 285
-
A real-time strategy game, “GALLIPOLI WARS,” as a centennial tribute to the Gallipoli Campaign (1915–2015)Aktaş, A Ziya / Orçun, Emre R et al. | 2017
- 303
-
Friendly casualty outcomes: choice of counter Improvised Explosive Device tactics matters on the asymmetric battlefieldBaca, Larry D / Proctor, Michael D et al. | 2017
- 315
-
Improved delay-dependent consensus stability criteria of high-order multi-agent systems with time delaysGe, Chao / Li, Wei / Zhang, Shuqing et al. | 2017