nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A casualty network analysis in non-major combat operations
|
Bastian, Nathaniel D |
|
2016 |
|
1 |
p. 95-108 |
artikel |
2 |
A General Method of Measuring Interoperability and Describing Its Impact on Operational Effectiveness
|
Ford, Thomas C. |
|
2009 |
|
1 |
p. 17-32 |
artikel |
3 |
A Graphical Model to Assess the Impact of Multi-Step Attacks
|
Kott, Alexander |
|
2018 |
|
1 |
p. 79-93 |
artikel |
4 |
A model-based fault tolerant control design for nonholonomic mobile robots in formation
|
Thumati, Balaje T |
|
2012 |
|
1 |
p. 17-31 |
artikel |
5 |
A model to estimate performance of space-based quantum communication protocols including quantum key distribution systems
|
Grimaila, Michael R |
|
2019 |
|
1 |
p. 5-13 |
artikel |
6 |
A module-based simulation framework to facilitate the modeling of Quantum Key Distribution system post-processing functionalities
|
Grimaila, Michael R |
|
2019 |
|
1 |
p. 45-56 |
artikel |
7 |
A multi-objective optimization framework for assessing military ground vehicle design for safety
|
Hoffenson, Steven |
|
2014 |
|
1 |
p. 33-46 |
artikel |
8 |
An architecture to facilitate interoperability of Discrete Event System Specification and Coalition Battle Management Language simulation models
|
Hosang, Elizabeth |
|
2016 |
|
1 |
p. 43-65 |
artikel |
9 |
An autonomous communications relay in GPS-denied environments via antenna diversity
|
Griffin, Brian |
|
2012 |
|
1 |
p. 33-44 |
artikel |
10 |
An introductory preview of Autonomous Intelligent Cyber-defense Agent reference architecture, release 2.0
|
Damodaran, Suresh |
|
|
|
1 |
p. 51-54 |
artikel |
11 |
A note on promoting positive emergence and managing negative emergence in systems of systems
|
Zeigler, Bernard P |
|
2016 |
|
1 |
p. 133-136 |
artikel |
12 |
A particle-filter information potential method for tracking and monitoring maneuvering targets using a mobile sensor agent
|
Lu, W |
|
2014 |
|
1 |
p. 47-58 |
artikel |
13 |
A Q-learning approach to automated unmanned air vehicle demining
|
Ferrari, Silvia |
|
2012 |
|
1 |
p. 83-92 |
artikel |
14 |
A quantum algorithm for uniform sampling of models of propositional logic based on quantum probability
|
Grimaila, Michael R |
|
2019 |
|
1 |
p. 57-65 |
artikel |
15 |
A Robust, Multi-criteria Modeling Approach for Optimizing Aeromedical Evacuation Asset Emplacement
|
Bastian, Nathaniel D. |
|
2010 |
|
1 |
p. 5-23 |
artikel |
16 |
A simulation assessment of methods to infer cultural transmission on dark networks
|
Davis, Paul K |
|
2017 |
|
1 |
p. 7-16 |
artikel |
17 |
Assessing the cognitive complexity of cyber range environments
|
Damodaran, Suresh |
|
|
|
1 |
p. 39-46 |
artikel |
18 |
AutoDEVS: A Methodology for Automating Modeling and Simulation Software Development and Testing of Interoperable Systems
|
Salas, Manuel C. |
|
2009 |
|
1 |
p. 33-52 |
artikel |
19 |
Automated Link-16 Testing Using the Discrete Event System Specification and Extensible Markup Language
|
Mak, Eddie |
|
2010 |
|
1 |
p. 39-62 |
artikel |
20 |
Ballistic limit velocity of empty rectangular metal columns under a blunt projectile penetration
|
Niknejad, Abbas |
|
2016 |
|
1 |
p. 119-131 |
artikel |
21 |
Building entity models through observational learning
|
Garcia, Richard D |
|
2014 |
|
1 |
p. 59-71 |
artikel |
22 |
Call for papers: Special Issue Discovering the landscape of applied theories to understand the adversary
|
Davis, Paul K |
|
2017 |
|
1 |
p. 107-108 |
artikel |
23 |
Call for Papers: Special Issue: Leveraging Modeling and Simulation as a Service for the Future M&S Eco-system
|
|
|
2015 |
|
1 |
p. 79-80 |
artikel |
24 |
Call for papers: Special Issue Modeling and Simulation to Support Cyber Defense (J17-3)
|
Kott, Alexander |
|
2018 |
|
1 |
p. 121-122 |
artikel |
25 |
CARVER 2.0: integrating the Analytical Hierarchy Process’s multi-attribute decision-making weighting scheme for a center of gravity vulnerability analysis for US Special Operations Forces
|
Kott, Alexander |
|
2018 |
|
1 |
p. 111-120 |
artikel |
26 |
Compressed natural gas as a feasible replacement fuel for U.S. transportation
|
Anderson, Bradley E |
|
2015 |
|
1 |
p. 67-78 |
artikel |
27 |
Concept development for comprehensive operations support with modeling and simulation
|
Damodaran, Suresh |
|
|
|
1 |
p. 99-116 |
artikel |
28 |
Considerations in managing the fill rate of the Grand Ethiopian Renaissance Dam Reservoir using a system dynamics approach
|
Davis, Paul K |
|
2017 |
|
1 |
p. 33-43 |
artikel |
29 |
Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach
|
Kott, Alexander |
|
2018 |
|
1 |
p. 13-29 |
artikel |
30 |
Derivation and implications of patient condition estimates
|
Wing, Vern |
|
2016 |
|
1 |
p. 17-22 |
artikel |
31 |
Editorial
|
Couretas, Jerry M. |
|
2010 |
|
1 |
p. 3-3 |
artikel |
32 |
Enabling intelligent unmanned vehicles through XMOS Technology
|
Martins, Goncalo |
|
2012 |
|
1 |
p. 71-82 |
artikel |
33 |
Engineering the New Combat Support Hospital
|
Fulton, Lawrence V. |
|
2010 |
|
1 |
p. 25-37 |
artikel |
34 |
Enhancing airlift fuel efficiency through increased utilization of cargo capacity
|
Reiman, Adam D. |
|
2015 |
|
1 |
p. 19-29 |
artikel |
35 |
Experiments with autonomous mobile radios for wireless tethering in tunnels
|
Moore, Kevin L |
|
2012 |
|
1 |
p. 45-58 |
artikel |
36 |
Force design analysis of the Army aeromedical evacuation company: a quantitative approach
|
Bastian, Nathaniel D |
|
2013 |
|
1 |
p. 23-30 |
artikel |
37 |
Fuel efficiency assessment with Data Envelopment Analysis
|
Kiymaz, Evren |
|
2015 |
|
1 |
p. 57-66 |
artikel |
38 |
Fuel-saving ship route using the Navy’s ensemble meteorological and oceanic forecasts
|
Chu, Peter C |
|
2015 |
|
1 |
p. 41-56 |
artikel |
39 |
Future challenges for cyber simulation
|
Damodaran, Suresh |
|
|
|
1 |
p. 47-49 |
artikel |
40 |
Fuzzy cognitive maps of public support for insurgency and terrorism
|
Davis, Paul K |
|
2017 |
|
1 |
p. 17-32 |
artikel |
41 |
Governance of Data Initialization for Service Oriented Architecture-based Military Simulation and Command and Control Federations
|
Lanman, Jeremy T. |
|
2009 |
|
1 |
p. 5-16 |
artikel |
42 |
Image fusion method using non-subsampled shearlet transform and fuzzy and simple fuzzy neural network algorithms
|
Subramanian, P |
|
2016 |
|
1 |
p. 23-33 |
artikel |
43 |
Implementing the decoy state protocol in a practically oriented Quantum Key Distribution system-level model
|
Grimaila, Michael R |
|
2019 |
|
1 |
p. 27-44 |
artikel |
44 |
Introduction
|
Couretas, Jerry M. |
|
2009 |
|
1 |
p. 1-1 |
artikel |
45 |
Inventory routing for defense: Moving supplies in adversarial and partially observable environments
|
Damodaran, Suresh |
|
|
|
1 |
p. 55-81 |
artikel |
46 |
Letter to the editor: Approximate morphism
|
Davis, Paul K |
|
2017 |
|
1 |
p. 109-110 |
artikel |
47 |
Malware modeling and experimentation through parameterized behavior
|
Kott, Alexander |
|
2018 |
|
1 |
p. 31-48 |
artikel |
48 |
Modeling and estimating continuous Improvised Explosive Device supply chain behavior
|
Liu, Tony |
|
2016 |
|
1 |
p. 67-75 |
artikel |
49 |
Modeling and integration of situational awareness and soldier target search
|
Evangelista, Paul F |
|
2013 |
|
1 |
p. 3-21 |
artikel |
50 |
Modeling and simulation of quantum information, quantum communication, and quantum key distribution (QKD) systems
|
Grimaila, Michael R |
|
2019 |
|
1 |
p. 3-4 |
artikel |
51 |
Modeling and simulation to support cyber defense
|
Damodaran, Suresh |
|
|
|
1 |
p. 3-4 |
artikel |
52 |
Modeling a nuclear detonation in a conventional campaign simulation
|
Hefty, Kiley E |
|
2016 |
|
1 |
p. 109-117 |
artikel |
53 |
Modeling insurgency, counter-insurgency, and coalition strategies and operations
|
Arney, David Chris |
|
2013 |
|
1 |
p. 57-73 |
artikel |
54 |
Modeling of Underwater Bomb Trajectory for Mine Clearance
|
Chu, Peter C |
|
2011 |
|
1 |
p. 25-36 |
artikel |
55 |
Modeling quantum optics for quantum key distribution system simulation
|
Grimaila, Michael R |
|
2019 |
|
1 |
p. 15-26 |
artikel |
56 |
Modeling risk as a polyhedron
|
Gay, Richard J |
|
2013 |
|
1 |
p. 49-56 |
artikel |
57 |
Models for restoration decision making for a supply chain network after a cyber attack
|
Damodaran, Suresh |
|
|
|
1 |
p. 5-19 |
artikel |
58 |
Neuro-optimal control of an unmanned helicopter
|
Nodland, David |
|
2014 |
|
1 |
p. 5-18 |
artikel |
59 |
Online adaptive learning for team strategies in multi-agent systems
|
Hudas, Greg |
|
2012 |
|
1 |
p. 59-69 |
artikel |
60 |
OpenFlow arbitrated programmable network channels for managing quantum metadata
|
Grimaila, Michael R |
|
2019 |
|
1 |
p. 67-77 |
artikel |
61 |
Operations Intent and Effects Model
|
Gustavsson, Per M |
|
2011 |
|
1 |
p. 37-59 |
artikel |
62 |
Optimization in an asymmetric Lanchester (n, 1) model
|
Damodaran, Suresh |
|
|
|
1 |
p. 117-122 |
artikel |
63 |
Predicting emplacements of improvised explosive devices
|
Guo, Jaff |
|
2013 |
|
1 |
p. 75-86 |
artikel |
64 |
Ranking terrorist targets using a hybrid AHP–TOPSIS methodology
|
Fox, William P |
|
2016 |
|
1 |
p. 77-93 |
artikel |
65 |
Representing qualitative social science in computational models to aid reasoning under uncertainty: National security examples
|
Davis, Paul K |
|
2017 |
|
1 |
p. 57-78 |
artikel |
66 |
Response surface modeling of precision-guided fragmentation munitions
|
Damodaran, Suresh |
|
|
|
1 |
p. 83-97 |
artikel |
67 |
Robust static planning tool for military village search missions: model and heuristics
|
Maxwell, Paul |
|
2013 |
|
1 |
p. 31-47 |
artikel |
68 |
Sensing and Identifying the Improvised Explosive Device Suicide Bombers: People Carrying Wires on their Body
|
Fox, William P |
|
2011 |
|
1 |
p. 5-24 |
artikel |
69 |
Society of Modeling and Simulation (SCS) Election
|
|
|
2012 |
|
1 |
p. 93-93 |
artikel |
70 |
Special Issue: Fuel conservation and alternative energy in the Department of Defense
|
Anderson, Bradley E. |
|
2015 |
|
1 |
p. 3-4 |
artikel |
71 |
Special issue: intelligent behaviors in military unmanned systems
|
Mikulski, Dariusz |
|
2014 |
|
1 |
p. 3-4 |
artikel |
72 |
Special Issue: Intelligent Behaviors in Tactical Unmanned Systems
|
Hudas, Greg |
|
2012 |
|
1 |
p. 3-4 |
artikel |
73 |
Special Issue on C2 Superiority through Systems Interoperability
|
Pullen, J. Mark |
|
2009 |
|
1 |
p. 3-4 |
artikel |
74 |
Special issue: Representing social science in national-security-related modeling and simulation
|
Davis, Paul K |
|
2017 |
|
1 |
p. 3-5 |
artikel |
75 |
Statistical models for the number of successful cyber intrusions
|
Kott, Alexander |
|
2018 |
|
1 |
p. 49-63 |
artikel |
76 |
Surfing aircraft vortices for energy
|
Blake, William B. |
|
2015 |
|
1 |
p. 31-39 |
artikel |
77 |
Thanks to Reviewers
|
Couretas, Jerry M. |
|
2011 |
|
1 |
p. 61-62 |
artikel |
78 |
Thanks to Reviewers
|
|
|
2014 |
|
1 |
p. 72-72 |
artikel |
79 |
The fuel multiplier in multi-stage supply chains
|
Regnier, Eva |
|
2015 |
|
1 |
p. 5-17 |
artikel |
80 |
The game-theoretic model and experimental investigation of cyber wargaming
|
Damodaran, Suresh |
|
|
|
1 |
p. 21-38 |
artikel |
81 |
The protoscience of cybersecurity
|
Kott, Alexander |
|
2018 |
|
1 |
p. 5-12 |
artikel |
82 |
The significance of model-driven paradigms in cyber security: an introduction
|
Kott, Alexander |
|
2018 |
|
1 |
p. 3-4 |
artikel |
83 |
The use of multiple methods in the Joint Irregular Warfare Analytic Baseline (JIWAB) study
|
Davis, Paul K |
|
2017 |
|
1 |
p. 45-55 |
artikel |
84 |
Threatcasting: a framework and process to model future operating environments
|
Grimaila, Michael R |
|
2019 |
|
1 |
p. 79-88 |
artikel |
85 |
Toward computational net assessment
|
Davis, Paul K |
|
2017 |
|
1 |
p. 79-94 |
artikel |
86 |
Towards a framework for more robust validation and verification of simulation models for systems of systems
|
Zeigler, Bernard P |
|
2016 |
|
1 |
p. 3-16 |
artikel |
87 |
Towards improving software security by using simulation to inform requirements and conceptual design
|
Nutaro, James |
|
2016 |
|
1 |
p. 35-41 |
artikel |
88 |
Trust-based coalition formation in multi-agent systems
|
Mikulski, Dariusz G |
|
2014 |
|
1 |
p. 19-32 |
artikel |
89 |
Understanding and taxonomy of uncertainty in modeling, simulation, and risk profiling for border control automation
|
Kott, Alexander |
|
2018 |
|
1 |
p. 95-109 |
artikel |
90 |
Unmanned aircraft systems as wingmen
|
Garcia, Richard D |
|
2012 |
|
1 |
p. 5-15 |
artikel |
91 |
Upcoming Special Issue - Modeling & Simulation in Counter Improvised Explosive Device (IED) Systems
|
Abeynayake, Canicious |
|
2011 |
|
1 |
p. 3-3 |
artikel |
92 |
Validation of the finite state machine model for network simulation and a proposed testbed
|
Kott, Alexander |
|
2018 |
|
1 |
p. 65-77 |
artikel |
93 |
WITHDRAWN: Deterring the development and use of nuclear weapons: A multi-level modeling approach
|
Davis, Paul K |
|
2017 |
|
1 |
p. 95-105 |
artikel |