Прати
Jerry Couretas
Jerry Couretas
DoD Modeling and Simulation Coordination Office
Верификована је имејл адреса на bah.com
Наслов
Навело
Навело
Година
Cyber modeling & simulation for cyber-range events
SK Damodaran, JM Couretas
Proceedings of the Conference on Summer Computer Simulation, 1-8, 2015
272015
An introduction to cyber modeling and simulation
JM Couretas
John Wiley & Sons, 2018
232018
DEVS-on-a-chip: implementing DEVS in real-time Java on a tiny Internet interface for scalable factory automation
X Hu, BP Zeigler, J Couretas
2001 IEEE International Conference on Systems, Man and Cybernetics. e …, 2001
202001
Automatic generation of system entity structure alternatives: Application to initial manufacturing facility design
JM Couretas, BP Zeigler, U Patel
Transactions of the Society for Computer Simulation International 16 (4 …, 1999
111999
Capacity analysis for mixed technology production: evaluating production ramp resource modifications via distributed simulation
JM Couretas, BP Zeigler, I Subramanian, H Sarjoughian
International Journal of Production Research 39 (2), 163-184, 2001
82001
Cyber security and defense for analysis and targeting
JM Couretas
An Introduction to Cyber Analysis and Targeting, 119-150, 2022
62022
Organizational adoption of innovation: Background, programs & a descriptive modeling approach
JM Couretas, ME Ucal
Proceedings of the 2011 Military Modeling & Simulation Symposium, 44-52, 2011
62011
SEAE-SES enterprise alternative evaluator: design and implementation of a manufacturing enterprise alternative evaluation tool
JM Couretas, BP Zeigler, GV Mignon
Enabling Technology for Simulation Science III 3696, 136-146, 1999
61999
Cyber Analysis and Targeting
JM Couretas
An Introduction to Cyber Analysis and Targeting, 1-12, 2022
42022
System architectures: legacy tools/methods, DoDAF descriptions and design through system alternative enumeration
JM Couretas
The Journal of Defense Modeling and Simulation 3 (4), 227-237, 2006
42006
Enterprise architectures: documentation views, evaluation tools and design alternative enumeration
JM Couretas, D Kim
2005 IEEE International Conference on Systems, Man and Cybernetics 4, 3654-3660, 2005
42005
Cyber systems design
JM Couretas
An Introduction to Cyber Analysis and Targeting, 173-195, 2022
32022
An Introduction to Cyber Analysis and Targeting
JM Couretas
Springer, 2022
32022
Cyber Model‐Based Evaluation Background
JM Couretas
Wiley Data and Cybersecurity, 2019
32019
Cyber modeling & simulation (M&S) for test and evaluation (T&E)
JM Couretas
Wiley Data and Cybersecurity, 2019
32019
System and method for evaluating system architectures
J Couretas, V Adrounie, J Hammond
US Patent App. 11/411,839, 2007
32007
Cyber operations: a case study approach
JM Couretas
John Wiley & Sons, 2024
22024
Cyber ISR and Analysis
JM Couretas
An Introduction to Cyber Analysis and Targeting, 91-118, 2022
22022
Cyber influence operations
JM Couretas
An Introduction to Cyber Analysis and Targeting, 57-89, 2022
22022
Using conceptual modeling to implement model based systems engineering for program capability analysis and assessment
JJ Daly, J Couretas
NDIA systems engineering conference, 2015
22015
Систем тренутно не може да изврши ову радњу. Пробајте поново касније.
Чланци 1–20