The Journal of Defense Modeling and Simulation
2018 - 2025
Bibliographic data for series maintained by SAGE Publications ().
Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 16, issue 4, 2019
- Operation Assessment: fundamentals and best practices to create a baseline for assessors (J18-1) pp. 251-253

- Lynette MB Arnhart, Marvin L King and Jonathan Schroden
- Assessing the theory of change in national strategies pp. 255-263

- Cathryn Quantic Thurston
- Design, assessment, and the causal imperative in complex operations and campaigns pp. 265-276

- Christopher J Hickey, Robert Bradford and Celestino Perez
- Development of composite indices and a regional assessment framework for analyzing nation-state health pp. 277-284

- Darryl K Ahner, Jennifer L Thompson and Karleine M Justice
- Effective Use of Public Perceptions in Assessments pp. 285-295

- Joseph Lindquist, David Peng, Shawnette Rochelle, Dusty Turner and Matt Warshaw
- Operation assessment: Lessons learned across echelons pp. 297-304

- James A Jablonski, Brian M Wade and Jonathan K Alt
- Evaluation theory and its application to military assessments pp. 305-322

- Andrew Keith, Darryl Ahner and Nicole Curtis
- Journal of Defense Modeling and Simulation (JDMS) special issue: Transforming the engineering enterprise—applications of Digital Engineering and Modular Open Systems Approach pp. 323-324

- Kristen Baldwin
- Digital engineering transformation across the Department of Defense pp. 325-338

- Phil Zimmerman, Tracee Gilbert and Frank Salvatore
- Transforming systems engineering through digital engineering pp. 339-355

- Mary A Bone, Mark R Blackburn, Donna H Rhodes, David N Cohen and Jaime A Guerrero
- CREATE/ERS: Department of Defense acquisition reform through resilient engineering and virtual prototyping in a digital environment pp. 357-371

- Douglass E Post, Owen J Eslinger, Scott M Sundt and Megan Holland
- Considerations and examples of a modular open systems approach in defense systems pp. 373-388

- Philomena Zimmerman, Monique Ofori, Donald Barrett, Joseph Soler and Anthony Harriman
- Modularity research to guide MOSA implementation pp. 389-401

- Navindran Davendralingam, Cesare Guariniello, Shashank Tamaskar, Daniel DeLaurentis and Mitchell Kerman
Volume 16, issue 3, 2019
- Supporting after action review in simulator mission training: Co-creating visualization concepts for training of fast-jet fighter pilots pp. 219-231

- Sanna Aronsson, Henrik Artman, Sinna Lindquist, Mikael Mitchell, Tomas Persson, Robert Ramberg, Mario Romero and Pontus ter Vehn
- Constraint programming heuristics and software tools for amphibious embarkation planning pp. 233-254

- Paul A Chircop and Timothy J Surendonk
- Dynamic synthetic environments: a survey pp. 255-271

- Ruben Smelik, Freek van Wermeskerken, Robbert Krijnen and Frido Kuijper
- A study of assorted data on suicide bombings in Pakistan pp. 273-282

- Sana Rasheed and Noman Khalid
- New algorithms for predicting longitudinal motion resistance of wheels on dry sand pp. 283-295

- James M Williams, Farshid Vahedifard, George L Mason and Jody D Priddy
- A Monte Carlo tradeoff analysis to guide resource investment in threat detection systems: From forensic to prospective investigations pp. 297-320

- Shelley Cazares, Jeffrey A Snyder, Joan Cartier, Felicia Sallis-Peterson and John Fregeau
- Prioritizing investment in military cyber capability using risk analysis pp. 321-333

- Cayt Rowe, Hossein Seif Zadeh, Ivan L. Garanovich, Li Jiang, Daniel Bilusich, Rick Nunes-Vaz and Anthony Ween
- Framing cyber warfare: an analyst’s perspective pp. 335-345

- Anthony Ween, Peter Dortmans, Nitin Thakur and Cayt Rowe
- WITHDRAWN (duplicate publication): Deterring the development and use of nuclear weapons: A multi-level modeling approach pp. 347-347

- N/a
Volume 16, issue 2, 2019
- Modeling of situation assessment in regional air defense combat pp. 91-101

- Hai-yan Yang, Shuai-wen Zhang and Xu-yu Li
- A multi-objective optimization of ballistic and cruise missile fire plans based on damage calculations from missile impacts on an airfield defended by an air defense artillery network pp. 103-117

- Brian M Wade
- Securing unmanned autonomous systems from cyber threats pp. 119-136

- Bharat B Madan, Manoj Banik and Doina Bein
- Research on the burst height measurement method based on the missile-borne millimeter wave detector pp. 137-144

- Cheng Cheng, Min Gao, Xiaodong Zhou and Jiacheng Li
- Multi-objective optimization using parallel simulation for space situational awareness pp. 145-157

- Michael S Felten, John M Colombi, Richard G Cobb and David W Meyer
- Design and evaluation of an avatar-based cultural training system pp. 159-174

- Donald E. Brown, Anne Moenning, Stephanie Guerlain, Benton Turnbull, Daniel Abel and Christine Meyer
- Mitigating the effects of boom occlusion on automated aerial refueling through shadow volumes pp. 175-189

- Zachary Paulson, Scott Nykl, John Pecarina and Brian Woolley
- US Army performance appraisal policy analysis: a simulation optimization approach pp. 191-205

- Lee A Evans and Ki-Hwan G Bae
- Analytics for awareness in maritime surveillance: from data to tactical insight pp. 207-215

- Terry Caelli, Joyanto Mukerjee and Evan Sparks
Volume 16, issue 1, 2019
- Modeling and simulation of quantum information, quantum communication, and quantum key distribution (QKD) systems pp. 3-4

- Michael R Grimaila
- A model to estimate performance of space-based quantum communication protocols including quantum key distribution systems pp. 5-13

- Jonathan C Denton, Douglas D Hodson, Richard G Cobb, Logan O Mailloux, Michael R Grimaila and Gerald Baumgartner
- Modeling quantum optics for quantum key distribution system simulation pp. 15-26

- Douglas D Hodson, Michael R Grimaila, Logan O Mailloux, Colin V McLaughlin and Gerald Baumgartner
- Implementing the decoy state protocol in a practically oriented Quantum Key Distribution system-level model pp. 27-44

- Ryan D Engle, Logan O Mailloux, Michael R Grimaila, Douglas D Hodson, Colin V McLaughlin and Gerald Baumgartner
- A module-based simulation framework to facilitate the modeling of Quantum Key Distribution system post-processing functionalities pp. 45-56

- Ryan D Engle, Douglas D Hodson, Logan O Mailloux, Michael R Grimaila, Colin V McLaughlin and Gerald Baumgartner
- A quantum algorithm for uniform sampling of models of propositional logic based on quantum probability pp. 57-65

- Radhakrishnan Balu, Dale Shires and Raju Namburu
- OpenFlow arbitrated programmable network channels for managing quantum metadata pp. 67-77

- Venkat R Dasari and Travis S Humble
- Threatcasting: a framework and process to model future operating environments pp. 79-88

- Natalie Vanatta and Brian David Johnson
Volume 15, issue 4, 2018
- Modeling the behavior of a hierarchy of command agents with context-based reasoning pp. 369-381

- Rikke Amilde Løvlid, Solveig Bruvoll, Karsten Brathen and Avelino Gonzalez
- Leveraging a design of experiments methodology to enhance impacts of modeling and simulations for engineered resilient systems pp. 383-397

- Alex D MacCalman and Simon R Goerger
- Estimating Ricochet Hazard Zones at Sea pp. 399-413

- Ramzi Mirshak and Talia Beech
- Understanding climate-induced migration through computational modeling: A critical overview with guidance for future efforts pp. 415-435

- Charlotte Till, Jamie Haverkamp, Devin White and Budhendra Bhaduri
- Rapid Operational Access and Maneuver Support platform for military logistics and operation planning in water environments pp. 437-447

- Drew Allan Loney, Kimberly Collins Pevey, Jennifer Tate McAlpin, Benjamin Wright Nelsen and Brent Harry Hargis
- Multi-objective mapping of full-mission simulators on heterogeneous distributed multi-processor systems pp. 449-460

- Rabeh Ayari, Imane Hafnaoui, Alexandra Aguiar, Patricia Gilbert, Michel Galibois, Jean-Pierre Rousseau, Giovanni Beltrame and Gabriela Nicolescu
- Obtaining a cross-engineering collaborative environment via transition to a model-based system engineering (MBSE) approach pp. 461-469

- Jane T Bachman
- A method of assessing the time-variant value of multi-domain architectures pp. 471-481

- Thomas Ford, David Meyer, John Colombi, Brian Scheller and Cody Palmer
- Deterring the development and use of nuclear weapons: a multi-level modeling approach pp. 483-493

- Kathleen M Carley, Geoffrey P Morgan and Michael J Lanham
- The role of approximate morphisms in multiresolution modeling: Can we relax the strict lumpability requirements? pp. 495-498

- Bernard P Zeigler
- Reviewer thank you list pp. 499-499

- N/a
Volume 15, issue 3, 2018
- Development and validation of a biofidelic head form model to assess blast-induced traumatic brain injury pp. 257-267

- Devon Downes, Amal Bouamoul, Simon Ouellet and Manouchehr Nejad Ensan
- Battle damage assessment of surface warship formation based on improved gray relational analysis pp. 269-278

- Zhuojie Xie, Yuhui Wang and Qingxian Wu
- Better analysis using the models and simulations hierarchy pp. 279-288

- Mark A Gallagher, Daniel V Hackman and Alisha A Lad
- Optimal strategy for target protection with a defender in the pursuit-evasion scenario pp. 289-301

- Qilong Sun, Naiming Qi and Mingying Huo
- Evolutionary sensor allocation for the Space Surveillance Network pp. 303-322

- Gabriel H Greve, Kenneth M Hopkinson and Gary B Lamont
- Methodology for targeting analysis for minimal response pp. 323-336

- W. P. Fox and J. Hansberger
- Profile of modeling and simulation research published in the Journal of Defense Modeling and Simulation pp. 337-349

- Navonil Mustafee, Korina Katsaliaki, Thibaut Le Forsonney and Saikou Diallio
- Dynamic response for shock loadings and stress analysis of a trajectory correcting fuse based on fuse–projectile–barrel coupling pp. 351-364

- Jianghai Hui, Min Gao and Xinpeng Li
Volume 15, issue 2, 2018
- Introduction to the second part of the special issue on model-driven paradigms for integrated approaches to cyber defense pp. 125-125

- Alexander Kott
- A game theoretic approach to cyber security risk management pp. 127-146

- Scott Musman and Andrew Turner
- Cyber defense in breadth: Modeling and analysis of integrated defense systems pp. 147-160

- Jin-Hee Cho and Noam Ben-Asher
- Comparative analysis and patch optimization using the cyber security analytics framework pp. 161-180

- Subil Abraham and Suku Nair
- Selection of countermeasures against network attacks based on dynamical calculation of security metrics pp. 181-204

- Igor Kotenko and Elena Doynikova
- An agent-based modeling framework for cybersecurity in mobile tactical networks pp. 205-218

- Brian Thompson and James Morris-King
- Proactive routing mutation against stealthy Distributed Denial of Service attacks: metrics, modeling, and analysis pp. 219-230

- Qi Duan, Ehab Al-Shaer, Samrat Chatterjee, Mahantesh Halappanavar and Christopher Oehmen
- Historical operational data analysis for defence preparedness planning pp. 231-244

- Kamran Shafi, Essam Debie and David Oliver
- Programmable control plane for mission critical wireless networks pp. 245-254

- Venkat R Dasari, Brian Jalaian and Saleil Bhat
Volume 15, issue 1, 2018
- The significance of model-driven paradigms in cyber security: an introduction pp. 3-4

- Alexander Kott
- The protoscience of cybersecurity pp. 5-12

- Eric N Hatleback
- Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach pp. 13-29

- Stephen Moskal, Shanchieh Jay Yang and Michael E Kuhl
- Malware modeling and experimentation through parameterized behavior pp. 31-48

- Z. Berkay Celik, Patrick McDaniel and Thomas Bowen
- Statistical models for the number of successful cyber intrusions pp. 49-63

- Nandi O Leslie, Richard E Harang, Lawrence P Knachel and Alexander Kott
- Validation of the finite state machine model for network simulation and a proposed testbed pp. 65-77

- Scott Brown and Harold Brown
- A Graphical Model to Assess the Impact of Multi-Step Attacks pp. 79-93

- Massimiliano Albanese and Sushil Jajodia
- Understanding and taxonomy of uncertainty in modeling, simulation, and risk profiling for border control automation pp. 95-109

- Svetlana N Yanushkevich, Shawn C Eastwood, Martin Drahansky and Vlad P Shmerko
- CARVER 2.0: integrating the Analytical Hierarchy Process’s multi-attribute decision-making weighting scheme for a center of gravity vulnerability analysis for US Special Operations Forces pp. 111-120

- Bradley Greaver, Leo Raabe, William P Fox and Robert E Burks
- Call for papers: Special Issue Modeling and Simulation to Support Cyber Defense (J17-3) pp. 121-122

- N/a
| |