[Raw
data] [50 most cited papers]
[50 most relevant papers]
[cites used to compute IF]
[Recent
citations ][Frequent citing
series ] [more data in
EconPapers]
[
trace new citations] [Missing
citations? Add them now]
[Incorrect content? Let us
know]
| IF | AIF | CIF | IF5 | DOC | CDO | CIT | NCI | CCU | D2Y | C2Y | D5Y | C5Y | SC | %SC | CiY | II | AII | |
| 2018 | 0 | 0.57 | 0 | 0 | 38 | 38 | 2 | 0 | 0 | 0 | 0 | 0 | 0.24 | |||||
| 2019 | 0 | 0.6 | 0 | 0 | 39 | 77 | 1 | 0 | 38 | 38 | 0 | 0 | 0.24 | |||||
| 2020 | 0.03 | 0.73 | 0.02 | 0.03 | 35 | 112 | 2 | 2 | 2 | 77 | 2 | 77 | 2 | 0 | 0 | 0.34 | ||
| 2021 | 0.03 | 1.02 | 0.02 | 0.02 | 10 | 122 | 0 | 2 | 4 | 74 | 2 | 112 | 2 | 0 | 0 | 0.38 |
| IF: | Two years Impact Factor: C2Y / D2Y |
| AIF: | Average Impact Factor for all series in RePEc in year y |
| CIF: | Cumulative impact factor |
| IF5: | Five years Impact Factor: C5Y / D5Y |
| DOC: | Number of documents published in year y |
| CDO: | Cumulative number of documents published until year y |
| CIT: | Number of citations to papers published in year y |
| NCI: | Number of citations in year y |
| CCU: | Cumulative number of citations to papers published until year y |
| D2Y: | Number of articles published in y-1 plus y-2 |
| C2Y: | Cites in y to articles published in y-1 plus y-2 |
| D5Y: | Number of articles published in y-1 until y-5 |
| C5Y: | Cites in y to articles published in y-1 until y-5 |
| SC: | selft citations in y to articles published in y-1 plus y-2 |
| %SC: | Percentage of selft citations in y to articles published in y-1 plus y-2 |
| CiY: | Cites in year y to documents published in year y |
| II: | Immediacy Index: CiY / Documents. |
| AII: | Average Immediacy Index for series in RePEc in year y |
| # | Year | Title | Cited |
|---|---|---|---|
| 1 | 2018 | A game theoretic approach to cyber security risk management. (2018). Turner, Andrew ; Musman, Scott . In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:15:y:2018:i:2:p:127-146. Full description at Econpapers || Download paper | 1 |
| 2 | 2020 | Models for restoration decision making for a supply chain network after a cyber attack. (2020). Sharkey, Thomas C ; Mitchell, John E ; Heath, Emily A. In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:17:y:2020:i:1:p:5-19. Full description at Econpapers || Download paper | 1 |
| 3 | 2018 | Statistical models for the number of successful cyber intrusions. (2018). Kott, Alexander ; Knachel, Lawrence P ; Harang, Richard E ; Leslie, Nandi O. In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:15:y:2018:i:1:p:49-63. Full description at Econpapers || Download paper | 1 |
| 4 | 2019 | Framing cyber warfare: an analystââ¬â¢s perspective. (2019). Rowe, Cayt ; Thakur, Nitin ; Dortmans, Peter ; Ween, Anthony . In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:16:y:2019:i:3:p:335-345. Full description at Econpapers || Download paper | 1 |
| 5 | 2022 | Deep neural networks for the assessment of surgical skills: A systematic review. (2022). De, Suvranu ; Norfleet, Jack ; Makled, Basiel ; van Voorst, Brian ; Diller, David ; Yan, Pingkun ; Kruger, Uwe ; Intes, Xavier ; Yanik, Erim. In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:19:y:2022:i:2:p:159-171. Full description at Econpapers || Download paper | 1 |
| 6 | 2019 | US Army performance appraisal policy analysis: a simulation optimization approach. (2019). Bae, Ki-Hwan G ; Evans, Lee A. In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:16:y:2019:i:2:p:191-205. Full description at Econpapers || Download paper | 1 |
| 7 | 2020 | Response surface modeling of precision-guided fragmentation munitions. (2020). McCarthy, Andrew ; Ahner, Darryl. In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:17:y:2020:i:1:p:83-97. Full description at Econpapers || Download paper | 1 |
| 8 | 2018 | Cyber defense in breadth: Modeling and analysis of integrated defense systems. (2018). Ben-Asher, Noam ; Cho, Jin-Hee. In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:15:y:2018:i:2:p:147-160. Full description at Econpapers || Download paper | 1 |
| 9 | 2020 | Inventory routing for defense: Moving supplies in adversarial and partially observable environments. (2020). Miller, Tim ; Gossink, Don ; Shekh, Slava ; Blom, Michelle ; Pearce, Adrian R. In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:17:y:2020:i:1:p:55-81. Full description at Econpapers || Download paper | 1 |
| # | Year | Title | Cited |
|---|
| Year | Title | |
|---|---|---|
| 2021 | Cybersecurity in logistics and supply chain management: An overview and future research directions. (2021). Bhattacharjya, Jyotirmoyee ; Cheung, Kam-Fung. In: Transportation Research Part E: Logistics and Transportation Review. RePEc:eee:transe:v:146:y:2021:i:c:s1366554520308590. Full description at Econpapers || Download paper | |
| 2021 | Systematically Understanding Cybersecurity Economics: A Survey. (2021). Overby, Harald ; Kowalski, Stewart J ; Kianpour, Mazaher. In: Sustainability. RePEc:gam:jsusta:v:13:y:2021:i:24:p:13677-:d:699824. Full description at Econpapers || Download paper |
| Year | Citing document |
|---|
| Year | Citing document |
|---|
| Year | Citing document |
|---|