Cyber modeling & simulation for cyber-range events SK Damodaran, JM Couretas Proceedings of the Conference on Summer Computer Simulation, 1-8, 2015 | 27 | 2015 |
An introduction to cyber modeling and simulation JM Couretas John Wiley & Sons, 2018 | 22 | 2018 |
DEVS-on-a-chip: implementing DEVS in real-time Java on a tiny Internet interface for scalable factory automation X Hu, BP Zeigler, J Couretas 2001 IEEE International Conference on Systems, Man and Cybernetics. e …, 2001 | 19 | 2001 |
Automatic generation of system entity structure alternatives: Application to initial manufacturing facility design JM Couretas, BP Zeigler, U Patel Transactions of the Society for Computer Simulation International 16 (4 …, 1999 | 10 | 1999 |
Capacity analysis for mixed technology production: evaluating production ramp resource modifications via distributed simulation JM Couretas, BP Zeigler, I Subramanian, H Sarjoughian International Journal of Production Research 39 (2), 163-184, 2001 | 7 | 2001 |
SEAE-SES enterprise alternative evaluator: design and implementation of a manufacturing enterprise alternative evaluation tool JM Couretas, BP Zeigler, GV Mignon Enabling Technology for Simulation Science III 3696, 136-146, 1999 | 7 | 1999 |
Organizational adoption of innovation: background, programs & a descriptive modeling approach JM Couretas, ME Ucal Proceedings of the 2011 Military Modeling & Simulation Symposium, 44-52, 2011 | 6 | 2011 |
System architectures: legacy tools/methods, DoDAF descriptions and design through system alternative enumeration JM Couretas The Journal of Defense Modeling and Simulation 3 (4), 227-237, 2006 | 4 | 2006 |
Enterprise architectures: documentation views, evaluation tools and design alternative enumeration JM Couretas, D Kim 2005 IEEE International Conference on Systems, Man and Cybernetics 4, 3654-3660, 2005 | 4 | 2005 |
Cyber Analysis and Targeting JM Couretas An Introduction to Cyber Analysis and Targeting, 1-12, 2022 | 3 | 2022 |
Cyber security and defense for analysis and targeting JM Couretas An Introduction to Cyber Analysis and Targeting, 119-150, 2022 | 3 | 2022 |
System and method for evaluating system architectures J Couretas, V Adrounie, J Hammond US Patent App. 11/411,839, 2007 | 3 | 2007 |
Cyber ISR and Analysis JM Couretas An Introduction to Cyber Analysis and Targeting, 91-118, 2022 | 2 | 2022 |
Cyber systems design JM Couretas An Introduction to Cyber Analysis and Targeting, 173-195, 2022 | 2 | 2022 |
Cyber Model‐Based Evaluation Background JM Couretas Wiley Data and Cybersecurity, 2019 | 2 | 2019 |
Cyber modeling & simulation (M&S) for test and evaluation (T&E) JM Couretas Wiley Data and Cybersecurity, 2019 | 2 | 2019 |
Using conceptual modeling to implement model based systems engineering for program capability analysis and assessment JJ Daly, J Couretas NDIA systems engineering conference, 2015 | 2 | 2015 |
DEVS-based endomorphic agents: Control through deliberative and reactive planning H Lyes, P Bourseau, G Muratet, JM Couretas, BP Zeigler International Conference on Computer Aided Systems Theory, 386-402, 1995 | 2 | 1995 |
Generation, control, and simulation of task level actions based on discrete event models JM Couretas, JW Rozenblit Fifth Annual Conference on AI, and Planning in High Autonomy Systems, 214-220, 1994 | 2 | 1994 |
Cyber Operations: A Case Study Approach JM Couretas John Wiley & Sons, 2024 | 1 | 2024 |