Skip to main content
Search form
Main menu
HOME
DIRECTORY
RESEARCH
COLLABORATIVE ENVIRONMENTS
CYBER SECURITY
BIG DATA MANAGEMENT
DATA MINING
GEOINFORMATICS
MOBILE APPLICATIONS
MODELING, SIMULATION AND ANALYSIS
SEMANTICS
SENSOR NETWORKS
VISUALIZATION
REAL TIME DATA
PROJECTS
CURRENT
HISTORICAL
PRODUCTS
OUTREACH
PUBLICATIONS and PRESENTATIONS
POSTERS
BROCHURES
ABOUT US
PROFESSIONAL
CAREERS
Tools for Simulating and Visualizing Petri Nets
Whitaker TS
,
Bland JA
,
Cantrell WA
,
Mayfield KP
,
Petty MD
.
Tools for Simulating and Visualizing Petri Nets
. 2018 AlaSim International Conference and Exposition. 2018 :88-109.
Read more
about Tools for Simulating and Visualizing Petri Nets
Google Scholar
Machine Learning Cyberattack and Defense Strategies
Bland JA
,
Cantrell WA
,
Mayfield KP
,
Petty MD
,
Whitaker TS
.
Machine Learning Cyberattack and Defense Strategies
. 2018 AlaSim International Conference and Exposition. 2018 :81-87.
Read more
about Machine Learning Cyberattack and Defense Strategies
Google Scholar
Structured Face Validation of Extended Petri Nets for Modeling Cyberattacks
Cantrell WA
,
Mayfield KP
,
Petty MD
,
Whitaker TS
,
Bland JA
.
Structured Face Validation of Extended Petri Nets for Modeling Cyberattacks
. 2018 AlaSim International Conference and Exposition. 2018 :123-139.
Read more
about Structured Face Validation of Extended Petri Nets for Modeling Cyberattacks
Google Scholar
An Extended Petri Net Formalism for Modeling Cyberattacks
Mayfield KP
,
Petty MD
,
Whitaker TS
,
Bland JA
,
Cantrell WA
.
An Extended Petri Net Formalism for Modeling Cyberattacks
. 2018 AlaSim International Conference and Exposition. 2018 :46-72.
Read more
about An Extended Petri Net Formalism for Modeling Cyberattacks
Google Scholar
A Model-based Systems Engineering Assessment of Cyber Security Modeling Methods
Cantrell WA
,
Petty MD
.
A Model-based Systems Engineering Assessment of Cyber Security Modeling Methods
. 2018 AlaSim International Conference and Exposition. 2018 :110-122.
Read more
about A Model-based Systems Engineering Assessment of Cyber Security Modeling Methods
Google Scholar
Monte Carlo Simulation with R for Combat Applications
Petty MD
,
Foster KL
.
Monte Carlo Simulation with R for Combat Applications
. 2018 AlaSim International Conference and Exposition. 2018 :25-45.
Read more
about Monte Carlo Simulation with R for Combat Applications
Google Scholar
Monte Carlo Simulation with R for Environmental Applications
Petty MD
,
Nemec KS
.
Monte Carlo Simulation with R for Environmental Applications
. 2018 AlaSim International Conference and Exposition. 2018 :9-24.
Read more
about Monte Carlo Simulation with R for Environmental Applications
Google Scholar
Petri Nets with Players, Strategies, and Cost: A Formalism for Modeling Cyberattacks
Mayfield KP
,
Petty MD
.
Petri Nets with Players, Strategies, and Cost: A Formalism for Modeling Cyberattacks
. 2018 International Conference on Security and Management. 2018 .
Read more
about Petri Nets with Players, Strategies, and Cost: A Formalism for Modeling Cyberattacks
Google Scholar
Composition of Cyberattack Model
Mayfield KP
,
Petty MD
,
Bland JA
,
Whitaker TS
.
Composition of Cyberattack Model
. 31st International Conference on Computer Applications in Industry and Engineering. 2018 :3-8.
Read more
about Composition of Cyberattack Model
Google Scholar
A discrete event simulation-based multi-objective reinforcement learning reward function for optimizing manufacturing material handling
Govindaiah S
,
Petty MD
.
A discrete event simulation-based multi-objective reinforcement learning reward function for optimizing manufacturing material handling
. 2019 Simulation Innovation Workshop. 2019 .
Read more
about A discrete event simulation-based multi-objective reinforcement learning reward function for optimizing manufacturing material handling
Google Scholar
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »