[Raw data] [50 most cited papers] [50 most relevant papers] [cites used to compute IF] [Recent citations ][Frequent citing series ] [more data in EconPapers] [trace new citations] [Missing citations? Add them now] [Incorrect content? Let us know]
IF | AIF | CIF | IF5 | DOC | CDO | CIT | NCI | CCU | D2Y | C2Y | D5Y | C5Y | SC | %SC | CiY | II | AII | |
2018 | 0 | 0.57 | 0 | 0 | 38 | 38 | 2 | 0 | 0 | 0 | 0 | 0 | 0.24 | |||||
2019 | 0 | 0.6 | 0 | 0 | 39 | 77 | 1 | 0 | 38 | 38 | 0 | 0 | 0.24 | |||||
2020 | 0.03 | 0.73 | 0.02 | 0.03 | 35 | 112 | 2 | 2 | 2 | 77 | 2 | 77 | 2 | 0 | 0 | 0.34 | ||
2021 | 0.03 | 1.02 | 0.02 | 0.02 | 10 | 122 | 0 | 2 | 4 | 74 | 2 | 112 | 2 | 0 | 0 | 0.38 |
IF: | Two years Impact Factor: C2Y / D2Y |
AIF: | Average Impact Factor for all series in RePEc in year y |
CIF: | Cumulative impact factor |
IF5: | Five years Impact Factor: C5Y / D5Y |
DOC: | Number of documents published in year y |
CDO: | Cumulative number of documents published until year y |
CIT: | Number of citations to papers published in year y |
NCI: | Number of citations in year y |
CCU: | Cumulative number of citations to papers published until year y |
D2Y: | Number of articles published in y-1 plus y-2 |
C2Y: | Cites in y to articles published in y-1 plus y-2 |
D5Y: | Number of articles published in y-1 until y-5 |
C5Y: | Cites in y to articles published in y-1 until y-5 |
SC: | selft citations in y to articles published in y-1 plus y-2 |
%SC: | Percentage of selft citations in y to articles published in y-1 plus y-2 |
CiY: | Cites in year y to documents published in year y |
II: | Immediacy Index: CiY / Documents. |
AII: | Average Immediacy Index for series in RePEc in year y |
# | Year | Title | Cited |
---|---|---|---|
1 | 2018 | A game theoretic approach to cyber security risk management. (2018). Turner, Andrew ; Musman, Scott . In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:15:y:2018:i:2:p:127-146. Full description at Econpapers || Download paper | 1 |
2 | 2020 | Models for restoration decision making for a supply chain network after a cyber attack. (2020). Sharkey, Thomas C ; Mitchell, John E ; Heath, Emily A. In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:17:y:2020:i:1:p:5-19. Full description at Econpapers || Download paper | 1 |
3 | 2018 | Statistical models for the number of successful cyber intrusions. (2018). Kott, Alexander ; Knachel, Lawrence P ; Harang, Richard E ; Leslie, Nandi O. In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:15:y:2018:i:1:p:49-63. Full description at Econpapers || Download paper | 1 |
4 | 2019 | Framing cyber warfare: an analystââ¬â¢s perspective. (2019). Rowe, Cayt ; Thakur, Nitin ; Dortmans, Peter ; Ween, Anthony . In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:16:y:2019:i:3:p:335-345. Full description at Econpapers || Download paper | 1 |
5 | 2022 | Deep neural networks for the assessment of surgical skills: A systematic review. (2022). De, Suvranu ; Norfleet, Jack ; Makled, Basiel ; van Voorst, Brian ; Diller, David ; Yan, Pingkun ; Kruger, Uwe ; Intes, Xavier ; Yanik, Erim. In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:19:y:2022:i:2:p:159-171. Full description at Econpapers || Download paper | 1 |
6 | 2019 | US Army performance appraisal policy analysis: a simulation optimization approach. (2019). Bae, Ki-Hwan G ; Evans, Lee A. In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:16:y:2019:i:2:p:191-205. Full description at Econpapers || Download paper | 1 |
7 | 2020 | Response surface modeling of precision-guided fragmentation munitions. (2020). McCarthy, Andrew ; Ahner, Darryl. In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:17:y:2020:i:1:p:83-97. Full description at Econpapers || Download paper | 1 |
8 | 2018 | Cyber defense in breadth: Modeling and analysis of integrated defense systems. (2018). Ben-Asher, Noam ; Cho, Jin-Hee. In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:15:y:2018:i:2:p:147-160. Full description at Econpapers || Download paper | 1 |
9 | 2020 | Inventory routing for defense: Moving supplies in adversarial and partially observable environments. (2020). Miller, Tim ; Gossink, Don ; Shekh, Slava ; Blom, Michelle ; Pearce, Adrian R. In: The Journal of Defense Modeling and Simulation. RePEc:sae:joudef:v:17:y:2020:i:1:p:55-81. Full description at Econpapers || Download paper | 1 |
# | Year | Title | Cited |
---|
Year | Title | |
---|---|---|
2021 | Cybersecurity in logistics and supply chain management: An overview and future research directions. (2021). Bhattacharjya, Jyotirmoyee ; Cheung, Kam-Fung. In: Transportation Research Part E: Logistics and Transportation Review. RePEc:eee:transe:v:146:y:2021:i:c:s1366554520308590. Full description at Econpapers || Download paper | |
2021 | Systematically Understanding Cybersecurity Economics: A Survey. (2021). Overby, Harald ; Kowalski, Stewart J ; Kianpour, Mazaher. In: Sustainability. RePEc:gam:jsusta:v:13:y:2021:i:24:p:13677-:d:699824. Full description at Econpapers || Download paper |
Year | Citing document |
---|
Year | Citing document |
---|
Year | Citing document |
---|