Follow
Jerry Couretas
Jerry Couretas
DoD Modeling and Simulation Coordination Office
Verified email at bah.com
Title
Cited by
Cited by
Year
Cyber modeling & simulation for cyber-range events
SK Damodaran, JM Couretas
Proceedings of the Conference on Summer Computer Simulation, 1-8, 2015
282015
An introduction to cyber modeling and simulation
JM Couretas
John Wiley & Sons, 2018
222018
DEVS-on-a-chip: implementing DEVS in real-time Java on a tiny Internet interface for scalable factory automation
X Hu, BP Zeigler, J Couretas
2001 IEEE International Conference on Systems, Man and Cybernetics. e …, 2001
192001
Automatic generation of system entity structure alternatives: Application to initial manufacturing facility design
JM Couretas, BP Zeigler, U Patel
Transactions of the Society for Computer Simulation International 16 (4 …, 1999
101999
Capacity analysis for mixed technology production: evaluating production ramp resource modifications via distributed simulation
JM Couretas, BP Zeigler, I Subramanian, H Sarjoughian
International Journal of Production Research 39 (2), 163-184, 2001
72001
SEAE-SES enterprise alternative evaluator: design and implementation of a manufacturing enterprise alternative evaluation tool
JM Couretas, BP Zeigler, GV Mignon
Enabling Technology for Simulation Science III 3696, 136-146, 1999
71999
Organizational adoption of innovation: background, programs & a descriptive modeling approach
JM Couretas, ME Ucal
Proceedings of the 2011 Military Modeling & Simulation Symposium, 44-52, 2011
62011
System architectures: legacy tools/methods, DoDAF descriptions and design through system alternative enumeration
JM Couretas
The Journal of Defense Modeling and Simulation 3 (4), 227-237, 2006
42006
Enterprise architectures: documentation views, evaluation tools and design alternative enumeration
JM Couretas, D Kim
2005 IEEE International Conference on Systems, Man and Cybernetics 4, 3654-3660, 2005
42005
Cyber security and defense for analysis and targeting
JM Couretas
An Introduction to Cyber Analysis and Targeting, 119-150, 2022
32022
System and method for evaluating system architectures
J Couretas, V Adrounie, J Hammond
US Patent App. 11/411,839, 2007
32007
Cyber Analysis and Targeting
JM Couretas
An Introduction to Cyber Analysis and Targeting, 1-12, 2022
22022
Cyber systems design
JM Couretas
An Introduction to Cyber Analysis and Targeting, 173-195, 2022
22022
Cyber Model‐Based Evaluation Background
JM Couretas
Wiley Data and Cybersecurity, 2019
22019
Cyber modeling & simulation (M&S) for test and evaluation (T&E)
JM Couretas
Wiley Data and Cybersecurity, 2019
22019
DEVS-based endomorphic agents: Control through deliberative and reactive planning
H Lyes, P Bourseau, G Muratet, JM Couretas, BP Zeigler
International Conference on Computer Aided Systems Theory, 386-402, 1995
21995
Generation, control, and simulation of task level actions based on discrete event models
JM Couretas, JW Rozenblit
Fifth Annual Conference on AI, and Planning in High Autonomy Systems, 214-220, 1994
21994
Measures of cyber performance and effectiveness
JM Couretas
An Introduction to Cyber Analysis and Targeting, 197-219, 2022
12022
Cyber ISR and Analysis
JM Couretas
An Introduction to Cyber Analysis and Targeting, 91-118, 2022
12022
Cyber Influence Operations
JM Couretas
An Introduction to Cyber Analysis and Targeting, 57-89, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20