PUBLICATIONS and PRESENTATIONS

Found 29 results
Filters: Author is M. D. Petty  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
V
Cantrell WA, Showers PM, Petty MD. Verification of XML Encoded Petri Nets Modeling Cyberattacks. Proceedings of the 2019 AlaSim Conference and Exhibition. 2019 .
S
O’Neil DA, Petty MD. Synthesizing Social Networks with Iterated Prisoners’ Dilemma. 16th International Conference on Modeling, Simulation, and Visualization Methods. 2019 :3-10.
Cantrell WA, Mayfield KP, Petty MD, Whitaker TS, Bland JA. Structured Face Validation of Extended Petri Nets for Modeling Cyberattacks. 2018 AlaSim International Conference and Exposition. 2018 :123-139.
Bland JA, Colvett CD, Petty MD, Baker KR. Simulating Cyberattacks with a Petri Net Discrete Event Simulator. 6th Annual Conference on Computational Science and Computational Intelligence. 2019 .
R
Papelis YE, Petty MD. Recognizing the contributions of reviewers in publishing and peer review. SIMULATION: Transactions of the Society for Modeling and Simulation International. 2018 ;94(4):227-278.
P
Mayfield KP, Petty MD. Petri Nets with Players, Strategies, and Cost: A Formalism for Modeling Cyberattacks. 2018 International Conference on Security and Management. 2018 .
M
Petty MD, Foster KL. Monte Carlo Simulation with R for Missile Defense Applications. 2019 AlaSim Conference and Exhibition. 2019 .
Petty MD, Nemec KS. Monte Carlo Simulation with R for Environmental Applications. 2018 AlaSim International Conference and Exposition. 2018 :9-24.
Petty MD, Foster KL. Monte Carlo Simulation with R for Combat Applications. 2018 AlaSim International Conference and Exposition. 2018 :25-45.
O’Neil DA, Petty MD. A Monte Carlo Algorithm for Generating Synthetic Social Networks Based on Personality Compatibility. 2019 IEEE SoutheastCon. 2019 .
Petty MD, Whitaker TS, Bland JA, Cantrell WA, Mayfield KP. Modeling Cyberattacks with Extended Petri Nets: Research Program Overview and Status Report. 2019 International Conference on Modeling, Simulation, and Visualization Methods. 2019 :27-33.
Petty MD, Showers PM, Whitaker TS, Bland JA, Cantrell WA, Colvett CD, Maxwell KP. Modeling Cyberattacks with Extended Petri Nets: Research Program Update. 2019 AlaSim Conference and Exhibition. 2019 .
Petty MD. Modeling and Validation Challenges for Complex Systems. In: Engineering Emergence: A Modeling and Simulation Approach. Engineering Emergence: A Modeling and Simulation Approach. Boca Raton FL: CRC Press; 2019. pp. 199-216.
Cantrell WA, Petty MD. A Model-based Systems Engineering Assessment of Cyber Security Modeling Methods. 2018 AlaSim International Conference and Exposition. 2018 :110-122.
Bland JA, Colvett CD, Cantrell WA, Mayfield KP, Petty MD, Whitaker TS. Machine Learning Cyberattack Strategies with Petri Nets with Players, Strategies, and Costs. 2019 National Cyber Summit. 2019 :1-16.
Bland JA, Cantrell WA, Mayfield KP, Petty MD, Whitaker TS. Machine Learning Cyberattack and Defense Strategies. 2018 AlaSim International Conference and Exposition. 2018 :81-87.
C
Mayfield KP, Petty MD, Bland JA, Whitaker TS. Composition of Cyberattack Model. 31st International Conference on Computer Applications in Industry and Engineering. 2018 :3-8.
Mayfield KP, Petty MD, Whitaker TS, Bland JA, Cantrell WA. Component-based Implementation of Cyberattack Simulation Models. 2019 ACM Southeast Conference. 2019 :64-71.
Mayfield KP, Petty MD, Whitaker TS, Cantrell WA, Hice SM, McClendon J, Reyes PJ. Component Selection Process in Assembling Cyberattack Simulation Models. 2019 International Conference on Security and Management. 2019 :168-174.
Garrison WT, Petty MD. A Comparison of Simulation Optimization Algorithm Performance. 2019 IEEE SoutheastCon. 2019 .

Pages