EconPapers    
Economics at your fingertips  
 

The Journal of Defense Modeling and Simulation

2018 - 2025


Bibliographic data for series maintained by SAGE Publications ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 16, issue 4, 2019

Operation Assessment: fundamentals and best practices to create a baseline for assessors (J18-1) pp. 251-253 Downloads
Lynette MB Arnhart, Marvin L King and Jonathan Schroden
Assessing the theory of change in national strategies pp. 255-263 Downloads
Cathryn Quantic Thurston
Design, assessment, and the causal imperative in complex operations and campaigns pp. 265-276 Downloads
Christopher J Hickey, Robert Bradford and Celestino Perez
Development of composite indices and a regional assessment framework for analyzing nation-state health pp. 277-284 Downloads
Darryl K Ahner, Jennifer L Thompson and Karleine M Justice
Effective Use of Public Perceptions in Assessments pp. 285-295 Downloads
Joseph Lindquist, David Peng, Shawnette Rochelle, Dusty Turner and Matt Warshaw
Operation assessment: Lessons learned across echelons pp. 297-304 Downloads
James A Jablonski, Brian M Wade and Jonathan K Alt
Evaluation theory and its application to military assessments pp. 305-322 Downloads
Andrew Keith, Darryl Ahner and Nicole Curtis
Journal of Defense Modeling and Simulation (JDMS) special issue: Transforming the engineering enterprise—applications of Digital Engineering and Modular Open Systems Approach pp. 323-324 Downloads
Kristen Baldwin
Digital engineering transformation across the Department of Defense pp. 325-338 Downloads
Phil Zimmerman, Tracee Gilbert and Frank Salvatore
Transforming systems engineering through digital engineering pp. 339-355 Downloads
Mary A Bone, Mark R Blackburn, Donna H Rhodes, David N Cohen and Jaime A Guerrero
CREATE/ERS: Department of Defense acquisition reform through resilient engineering and virtual prototyping in a digital environment pp. 357-371 Downloads
Douglass E Post, Owen J Eslinger, Scott M Sundt and Megan Holland
Considerations and examples of a modular open systems approach in defense systems pp. 373-388 Downloads
Philomena Zimmerman, Monique Ofori, Donald Barrett, Joseph Soler and Anthony Harriman
Modularity research to guide MOSA implementation pp. 389-401 Downloads
Navindran Davendralingam, Cesare Guariniello, Shashank Tamaskar, Daniel DeLaurentis and Mitchell Kerman

Volume 16, issue 3, 2019

Supporting after action review in simulator mission training: Co-creating visualization concepts for training of fast-jet fighter pilots pp. 219-231 Downloads
Sanna Aronsson, Henrik Artman, Sinna Lindquist, Mikael Mitchell, Tomas Persson, Robert Ramberg, Mario Romero and Pontus ter Vehn
Constraint programming heuristics and software tools for amphibious embarkation planning pp. 233-254 Downloads
Paul A Chircop and Timothy J Surendonk
Dynamic synthetic environments: a survey pp. 255-271 Downloads
Ruben Smelik, Freek van Wermeskerken, Robbert Krijnen and Frido Kuijper
A study of assorted data on suicide bombings in Pakistan pp. 273-282 Downloads
Sana Rasheed and Noman Khalid
New algorithms for predicting longitudinal motion resistance of wheels on dry sand pp. 283-295 Downloads
James M Williams, Farshid Vahedifard, George L Mason and Jody D Priddy
A Monte Carlo tradeoff analysis to guide resource investment in threat detection systems: From forensic to prospective investigations pp. 297-320 Downloads
Shelley Cazares, Jeffrey A Snyder, Joan Cartier, Felicia Sallis-Peterson and John Fregeau
Prioritizing investment in military cyber capability using risk analysis pp. 321-333 Downloads
Cayt Rowe, Hossein Seif Zadeh, Ivan L. Garanovich, Li Jiang, Daniel Bilusich, Rick Nunes-Vaz and Anthony Ween
Framing cyber warfare: an analyst’s perspective pp. 335-345 Downloads
Anthony Ween, Peter Dortmans, Nitin Thakur and Cayt Rowe
WITHDRAWN (duplicate publication): Deterring the development and use of nuclear weapons: A multi-level modeling approach pp. 347-347 Downloads
N/a

Volume 16, issue 2, 2019

Modeling of situation assessment in regional air defense combat pp. 91-101 Downloads
Hai-yan Yang, Shuai-wen Zhang and Xu-yu Li
A multi-objective optimization of ballistic and cruise missile fire plans based on damage calculations from missile impacts on an airfield defended by an air defense artillery network pp. 103-117 Downloads
Brian M Wade
Securing unmanned autonomous systems from cyber threats pp. 119-136 Downloads
Bharat B Madan, Manoj Banik and Doina Bein
Research on the burst height measurement method based on the missile-borne millimeter wave detector pp. 137-144 Downloads
Cheng Cheng, Min Gao, Xiaodong Zhou and Jiacheng Li
Multi-objective optimization using parallel simulation for space situational awareness pp. 145-157 Downloads
Michael S Felten, John M Colombi, Richard G Cobb and David W Meyer
Design and evaluation of an avatar-based cultural training system pp. 159-174 Downloads
Donald E. Brown, Anne Moenning, Stephanie Guerlain, Benton Turnbull, Daniel Abel and Christine Meyer
Mitigating the effects of boom occlusion on automated aerial refueling through shadow volumes pp. 175-189 Downloads
Zachary Paulson, Scott Nykl, John Pecarina and Brian Woolley
US Army performance appraisal policy analysis: a simulation optimization approach pp. 191-205 Downloads
Lee A Evans and Ki-Hwan G Bae
Analytics for awareness in maritime surveillance: from data to tactical insight pp. 207-215 Downloads
Terry Caelli, Joyanto Mukerjee and Evan Sparks

Volume 16, issue 1, 2019

Modeling and simulation of quantum information, quantum communication, and quantum key distribution (QKD) systems pp. 3-4 Downloads
Michael R Grimaila
A model to estimate performance of space-based quantum communication protocols including quantum key distribution systems pp. 5-13 Downloads
Jonathan C Denton, Douglas D Hodson, Richard G Cobb, Logan O Mailloux, Michael R Grimaila and Gerald Baumgartner
Modeling quantum optics for quantum key distribution system simulation pp. 15-26 Downloads
Douglas D Hodson, Michael R Grimaila, Logan O Mailloux, Colin V McLaughlin and Gerald Baumgartner
Implementing the decoy state protocol in a practically oriented Quantum Key Distribution system-level model pp. 27-44 Downloads
Ryan D Engle, Logan O Mailloux, Michael R Grimaila, Douglas D Hodson, Colin V McLaughlin and Gerald Baumgartner
A module-based simulation framework to facilitate the modeling of Quantum Key Distribution system post-processing functionalities pp. 45-56 Downloads
Ryan D Engle, Douglas D Hodson, Logan O Mailloux, Michael R Grimaila, Colin V McLaughlin and Gerald Baumgartner
A quantum algorithm for uniform sampling of models of propositional logic based on quantum probability pp. 57-65 Downloads
Radhakrishnan Balu, Dale Shires and Raju Namburu
OpenFlow arbitrated programmable network channels for managing quantum metadata pp. 67-77 Downloads
Venkat R Dasari and Travis S Humble
Threatcasting: a framework and process to model future operating environments pp. 79-88 Downloads
Natalie Vanatta and Brian David Johnson

Volume 15, issue 4, 2018

Modeling the behavior of a hierarchy of command agents with context-based reasoning pp. 369-381 Downloads
Rikke Amilde Løvlid, Solveig Bruvoll, Karsten Brathen and Avelino Gonzalez
Leveraging a design of experiments methodology to enhance impacts of modeling and simulations for engineered resilient systems pp. 383-397 Downloads
Alex D MacCalman and Simon R Goerger
Estimating Ricochet Hazard Zones at Sea pp. 399-413 Downloads
Ramzi Mirshak and Talia Beech
Understanding climate-induced migration through computational modeling: A critical overview with guidance for future efforts pp. 415-435 Downloads
Charlotte Till, Jamie Haverkamp, Devin White and Budhendra Bhaduri
Rapid Operational Access and Maneuver Support platform for military logistics and operation planning in water environments pp. 437-447 Downloads
Drew Allan Loney, Kimberly Collins Pevey, Jennifer Tate McAlpin, Benjamin Wright Nelsen and Brent Harry Hargis
Multi-objective mapping of full-mission simulators on heterogeneous distributed multi-processor systems pp. 449-460 Downloads
Rabeh Ayari, Imane Hafnaoui, Alexandra Aguiar, Patricia Gilbert, Michel Galibois, Jean-Pierre Rousseau, Giovanni Beltrame and Gabriela Nicolescu
Obtaining a cross-engineering collaborative environment via transition to a model-based system engineering (MBSE) approach pp. 461-469 Downloads
Jane T Bachman
A method of assessing the time-variant value of multi-domain architectures pp. 471-481 Downloads
Thomas Ford, David Meyer, John Colombi, Brian Scheller and Cody Palmer
Deterring the development and use of nuclear weapons: a multi-level modeling approach pp. 483-493 Downloads
Kathleen M Carley, Geoffrey P Morgan and Michael J Lanham
The role of approximate morphisms in multiresolution modeling: Can we relax the strict lumpability requirements? pp. 495-498 Downloads
Bernard P Zeigler
Reviewer thank you list pp. 499-499 Downloads
N/a

Volume 15, issue 3, 2018

Development and validation of a biofidelic head form model to assess blast-induced traumatic brain injury pp. 257-267 Downloads
Devon Downes, Amal Bouamoul, Simon Ouellet and Manouchehr Nejad Ensan
Battle damage assessment of surface warship formation based on improved gray relational analysis pp. 269-278 Downloads
Zhuojie Xie, Yuhui Wang and Qingxian Wu
Better analysis using the models and simulations hierarchy pp. 279-288 Downloads
Mark A Gallagher, Daniel V Hackman and Alisha A Lad
Optimal strategy for target protection with a defender in the pursuit-evasion scenario pp. 289-301 Downloads
Qilong Sun, Naiming Qi and Mingying Huo
Evolutionary sensor allocation for the Space Surveillance Network pp. 303-322 Downloads
Gabriel H Greve, Kenneth M Hopkinson and Gary B Lamont
Methodology for targeting analysis for minimal response pp. 323-336 Downloads
W. P. Fox and J. Hansberger
Profile of modeling and simulation research published in the Journal of Defense Modeling and Simulation pp. 337-349 Downloads
Navonil Mustafee, Korina Katsaliaki, Thibaut Le Forsonney and Saikou Diallio
Dynamic response for shock loadings and stress analysis of a trajectory correcting fuse based on fuse–projectile–barrel coupling pp. 351-364 Downloads
Jianghai Hui, Min Gao and Xinpeng Li

Volume 15, issue 2, 2018

Introduction to the second part of the special issue on model-driven paradigms for integrated approaches to cyber defense pp. 125-125 Downloads
Alexander Kott
A game theoretic approach to cyber security risk management pp. 127-146 Downloads
Scott Musman and Andrew Turner
Cyber defense in breadth: Modeling and analysis of integrated defense systems pp. 147-160 Downloads
Jin-Hee Cho and Noam Ben-Asher
Comparative analysis and patch optimization using the cyber security analytics framework pp. 161-180 Downloads
Subil Abraham and Suku Nair
Selection of countermeasures against network attacks based on dynamical calculation of security metrics pp. 181-204 Downloads
Igor Kotenko and Elena Doynikova
An agent-based modeling framework for cybersecurity in mobile tactical networks pp. 205-218 Downloads
Brian Thompson and James Morris-King
Proactive routing mutation against stealthy Distributed Denial of Service attacks: metrics, modeling, and analysis pp. 219-230 Downloads
Qi Duan, Ehab Al-Shaer, Samrat Chatterjee, Mahantesh Halappanavar and Christopher Oehmen
Historical operational data analysis for defence preparedness planning pp. 231-244 Downloads
Kamran Shafi, Essam Debie and David Oliver
Programmable control plane for mission critical wireless networks pp. 245-254 Downloads
Venkat R Dasari, Brian Jalaian and Saleil Bhat

Volume 15, issue 1, 2018

The significance of model-driven paradigms in cyber security: an introduction pp. 3-4 Downloads
Alexander Kott
The protoscience of cybersecurity pp. 5-12 Downloads
Eric N Hatleback
Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach pp. 13-29 Downloads
Stephen Moskal, Shanchieh Jay Yang and Michael E Kuhl
Malware modeling and experimentation through parameterized behavior pp. 31-48 Downloads
Z. Berkay Celik, Patrick McDaniel and Thomas Bowen
Statistical models for the number of successful cyber intrusions pp. 49-63 Downloads
Nandi O Leslie, Richard E Harang, Lawrence P Knachel and Alexander Kott
Validation of the finite state machine model for network simulation and a proposed testbed pp. 65-77 Downloads
Scott Brown and Harold Brown
A Graphical Model to Assess the Impact of Multi-Step Attacks pp. 79-93 Downloads
Massimiliano Albanese and Sushil Jajodia
Understanding and taxonomy of uncertainty in modeling, simulation, and risk profiling for border control automation pp. 95-109 Downloads
Svetlana N Yanushkevich, Shawn C Eastwood, Martin Drahansky and Vlad P Shmerko
CARVER 2.0: integrating the Analytical Hierarchy Process’s multi-attribute decision-making weighting scheme for a center of gravity vulnerability analysis for US Special Operations Forces pp. 111-120 Downloads
Bradley Greaver, Leo Raabe, William P Fox and Robert E Burks
Call for papers: Special Issue Modeling and Simulation to Support Cyber Defense (J17-3) pp. 121-122 Downloads
N/a
Page updated 2025-03-22