Executable behavioral modeling of system and software architecture specifications to inform resourcing decisions

M Farah-Stapleton, M Auguston… - Procedia Computer …, 2016 - Elsevier
The size, cost, and slow rate of change of DoD Information Technology (IT) systems in
comparison with commercial IT makes introduction of a new DoD system or capability …

[HTML][HTML] Modeling isomorphic systems processes using monterey phoenix

K Giammarco, L Troncale - Systems, 2018 - mdpi.com
This article describes preliminary research (a proof of concept test) on the potential value of
formalizing Isomorphic Systems Processes (ISPs) based on systems science research using …

[PDF][PDF] Assessing and visualizing risk in Monterey Phoenix through a supply chain cyber-attack use case

M Palmieri - 2021 - calhoun.nps.edu
This thesis explores how decision makers could use the Monterey Phoenix (MP) behavior
modeling tool developed at the Naval Postgraduate School to assess, visualize, and …

[PDF][PDF] Mission Scenario Generation and Characterization to Support Acquisition Decisions

K GIAMMARCO - 2020 - calhoun.nps.edu
Mission Scenario Generation and Characterization to Support Acquisition Decisions for
Long Range Precision Fires-Maritime (LRPF- Page 1 Calhoun: The NPS Institutional …

Cyber defense via event-based modeling: An approach for modeling and querying system of systems behaviors for unwanted states

J Rivera - 2017 IEEE 28th Annual Software Technology …, 2017 - ieeexplore.ieee.org
This paper presents a new approach for identifying unknown and/or unwanted states within
a system of systems (SoS) architecture using a graphical representation of the event-based …