|
|
- Cutting edge technologies for future military applications: trends and
challenges-
Free pre-print version: Loading...
Rate this result:
What is this?
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Michael Gargalakos Pages: 267 - 268 Abstract: The Journal of Defense Modeling and Simulation, Volume 21, Issue 3, Page 267-268, July 2024.
Citation: The Journal of Defense Modeling and Simulation PubDate: 2024-07-26T09:40:01Z DOI: 10.1177/15485129241263596 Issue No: Vol. 21, No. 3 (2024)
- Capability hardware enhanced instructions and artificial intelligence bill
of materials in trustworthy artificial intelligence systems: analyzing cybersecurity threats, exploits, and vulnerabilities in new software bills of materials with artificial intelligence-
Free pre-print version: Loading...
Rate this result:
What is this?
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Petar Radanliev, Omar Santos, Alistair Brandon-Jones Abstract: The Journal of Defense Modeling and Simulation, Ahead of Print. Integrating Capability-based Hierarchical Embedded RISC Instructions (CHERI) with the Artificial Intelligence (AI) Bill of Materials (AI BOMs) aims to enhance security and transparency in generative AI systems. With the increasing prevalence of AI and machine learning (ML), greater transparency and traceability are essential. This study introduces an analysis to explore how CHERI’s advanced security features can improve the reliability and transparency of AI BOMs, significantly contributing to the overall security of AI and ML technologies. The research employs a multi-faceted approach, combining theoretical analysis with practical evaluations. It begins with a comprehensive review of the existing literature on AI BOMs and CHERI, followed by an in-depth examination of cybersecurity threats, exploits, and vulnerabilities in new Software Bills of Materials (SBOMs). The study leverages AI methodologies, including data analysis techniques and AI-driven simulations, to assess the impact of integrating CHERI’s security features into AI BOMs. The study analyzes how CHERI and AI BOMs can enhance AI system security. The objectives include evaluating the role of AI BOMs in ensuring trust and quality in AI systems, assessing the efficacy of CHERI’s security features in mitigating cybersecurity threats, and identifying and analyzing cybersecurity threats, exploits, and vulnerabilities in SBOMs using AI techniques. The findings demonstrate that integrating CHERI with AI BOMs significantly enhances the security and transparency of AI systems. This integration helps identify and mitigate specific threats and vulnerabilities, improves trust and security in AI systems, and shows the potential of AI-driven methodologies in enhancing the security of SBOMs. By combining CHERI with AI BOMs, a promising pathway is established for creating more secure and transparent AI systems, addressing current cybersecurity challenges, and paving the way for future advancements in AI and ML technologies. Citation: The Journal of Defense Modeling and Simulation PubDate: 2024-08-02T05:44:31Z DOI: 10.1177/15485129241267919
- A quantitative comparison of two different models of minefield transit
-
Free pre-print version: Loading...
Rate this result:
What is this?
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Mikel D Petty Abstract: The Journal of Defense Modeling and Simulation, Ahead of Print. Naval mines are used to cause damage and inflict casualties on ships and to deny access to mined areas. Two distinctly different Monte Carlo models of surface ships transiting minefields were implemented and compared. An analytic model represents mines abstractly as mine density within the minefield. It determines the probability of a ship encountering a mine as a ratio of the area of the ship’s track through the minefield, with width equal to the mines’ effective radius and the area of the minefield. A geometric model represents the ship’s track and the mines’ locations explicitly. It determines whether a ship encounters a mine using a calculation of the distance between a ship’s track and the mines’ locations. The two models’ results were quantitatively compared for multiple values of five experimental variables: minefield dimensions, mine density, mine placement method, ships per group, and ship transit procedure. Each model was executed for each combination of experimental variable values and their results were compared to determine whether the models produced comparable results. In addition, the effectiveness of two mine placement methods at disabling ships and two ship transit procedures at avoiding mines were also compared. All comparisons used statistical hypothesis tests. Citation: The Journal of Defense Modeling and Simulation PubDate: 2024-07-24T06:07:12Z DOI: 10.1177/15485129241257528
- Developing an IoT-enabled probabilistic model for quick identification of
hidden radioactive materials in maritime port operations to strengthen global supply chain security-
Free pre-print version: Loading...
Rate this result:
What is this?
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Sergej Jakovlev, Tomas Eglynas, Mindaugas Jusis, Miroslav Voznak Abstract: The Journal of Defense Modeling and Simulation, Ahead of Print. Uncovering hidden radioactive materials continues to be a major hurdle in worldwide supply chains. Recent research has not adequately investigated practical Internet of Things (IoT)-based approaches for improving and implementing efficient data fusion techniques. Current systems often misuse resources, leading to security vulnerabilities in typical settings. Our research delves into the fundamental principles of detection using both single and multiple sensor configurations, adopting a probabilistic method for merging data. We introduce a model aimed at accelerating the detection of radiation emissions in actual port operations. The results highlight the model’s effectiveness in rapid identification and determine the best conditions for its application in scenarios involving stacked containers, whether they are on ships or positioned in storage areas. Citation: The Journal of Defense Modeling and Simulation PubDate: 2024-05-08T11:20:32Z DOI: 10.1177/15485129241251490
- Statement of requirements on the accuracy of rocket CFD analysis using
exterior ballistics for example rocket models-
Free pre-print version: Loading...
Rate this result:
What is this?
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Aram Baghiyan, Hovhannes Sargsyan, Areg Grigoryan Abstract: The Journal of Defense Modeling and Simulation, Ahead of Print. In this paper, the problem of acceptable accuracy of a rocket’s aerodynamic characteristics obtained from CFD (computational fluid dynamics) analysis for defining its aerodynamic characteristics is considered from the point of view of exterior ballistics, particularly by the estimation of the rocket’s simulated flight range change caused by CFD errors. The results obtained in this paper allow stating the requirement on acceptable accuracy of defining the aerodynamic characteristics for developing new rockets through CFD analysis based on several examples, which can be propagated to other cases of rocket design and development. Using this study as a method, the CFD engineers who work on rocket design and development can estimate the accepted accuracy margin of their CFD analysis and research solutions to get reliable results for the expected flight characteristics of the rocket. Citation: The Journal of Defense Modeling and Simulation PubDate: 2024-04-24T04:07:41Z DOI: 10.1177/15485129241247042
- Enhancing military medical evacuation dispatching with armed escort
management: comparing model-based reinforcement learning approaches-
Free pre-print version: Loading...
Rate this result:
What is this?
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Andrew G Gelbard, Phillip R Jenkins, Matthew J Robbins Abstract: The Journal of Defense Modeling and Simulation, Ahead of Print. The military medical evacuation (MEDEVAC) dispatching problem involves determining optimal policies for evacuating combat casualties to maximize patient survivability during military operations. This study explores a variation of the MEDEVAC dispatching problem, focusing on controlling armed escorts using a Markov decision process (MDP) model and model-based reinforcement learning (RL) approaches. A discounted, continuous-time MDP model over an infinite horizon is developed to maximize the expected total discounted reward of the system. Two model-based RL solution approaches are proposed: one utilizing semi-gradient descent Q-learning and another employing semi-gradient descent SARSA. A computational example, set in western and central Africa during contingency operations, assesses the performance of the RL-generated policies against the myopic policy, which military medical planners currently employ. Solution quality is derived from expected response time, a crucial determinant of life-saving potential in MEDEVAC operations. The research also explores sensitivity analysis and excursion scenarios to evaluate the RL-generated policies further. By explicitly controlling armed escort assets, dispatching authorities can better manage the location and allocation of these resources throughout combat operations. The findings of this study have the potential to inform military medical planning, operations, and tactics, ultimately leading to improved MEDEVAC system performance and higher patient survivability rates. Citation: The Journal of Defense Modeling and Simulation PubDate: 2024-04-11T06:36:23Z DOI: 10.1177/15485129241229762
- Assessing the US foreign assistance activities impact on violent conflicts
-
Free pre-print version: Loading...
Rate this result:
What is this?
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Daniel F Feze, Mark A Gallagher Abstract: The Journal of Defense Modeling and Simulation, Ahead of Print. The Global Fragility Act, H.R.2116 116th Congress, directs the Department of State to establish an interagency initiative to stabilize conflict-affected areas and prevent violence globally. We propose and demonstrate an approach to evaluate the success of funding these initiatives. The United States Agency for International Development (USAID) has identified deteriorating economies, weak, or illegitimate political institutions, and competition over natural resources as causes of violence, extremism, and instability. The agency prioritizes mitigating the causes and consequences of violent conflicts, instability, and extremism and funds corresponding programs. Focused on military aid, we quantitatively assess these programs effectiveness at preventing or deescalating conflicts during 2010 to 2020. Our statistical analysis shows the funds during that period did not have an immediate impact on countries prone to violence. However, cumulative long-term relationships exist between some funds and the global conflict levels. As the total amount of 5 years cumulative Defense Security Cooperation Agency (DSCA) implemented funds increases, the total number of countries not-in-conflict increases while the total number of the most violent countries decreases. Those funds also correlate to the decline in total conflict levels during that timeframe. This quantitative approach assesses the aggregate effectiveness of aid across various countries. Citation: The Journal of Defense Modeling and Simulation PubDate: 2024-04-08T03:49:38Z DOI: 10.1177/15485129241240760
- Estimation of terminal ballistics parameters for several 7.62×51 mm
projectiles using numerical simulations-
Free pre-print version: Loading...
Rate this result:
What is this?
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Catovic Alan Abstract: The Journal of Defense Modeling and Simulation, Ahead of Print. Six widely used 7.62 ×51 mm projectile types (M80, M61, P80/1, M80A1, M1158, and M993) were subjected to the analysis in this paper. Numerical simulations (Ansys Autodyn) of projectile impacts on hard steel targets were performed as part of this analysis. Projectiles had the same impact velocity (800 m/s). This allowed evaluation of the projectile’s design and material’s effect on its performance against a hard steel target. Validation of the numerical model and used materials was first performed, using available experimental data. A short description and Computer-Aided Design (CAD) model of projectiles is also given. Comparing the M1158 projectile to other AP projectiles taken into consideration, it was concluded that the former had a much deeper penetration depth into a hard steel target (Armox 500T). The projectile’s penetrating capability is greatly impacted by the material selection used for its component parts. Assuming all other factors remain constant, penetrators with higher density and harderness can achieve deeper penetration. Under the same conditions, an increase in penetrator length results in an increase in penetration depth. The absence of a gilding metal jacket in the projectile’s frontal ogive section can decrease energy required to remove the jacket during the penetration, hence increasing the projectile’s penetration capabilities. Citation: The Journal of Defense Modeling and Simulation PubDate: 2024-03-27T05:45:03Z DOI: 10.1177/15485129241240768
- Analysis comparison model of ROC-TOPSIS, ROC-WP, and ROC-Electre methods
for supporting the funding decision to micro-enterprises Indonesia-
Free pre-print version: Loading...
Rate this result:
What is this?
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Noerul Hanin, Hendri Purwanto Abstract: The Journal of Defense Modeling and Simulation, Ahead of Print. Micro-business is an essential business unit that supports the economies of countries in the world, including Indonesia. Unfortunately, micro-entrepreneurs often find difficulties to obtain financial assistance from government to develop their businesses. In Indonesia, the smallest number of micro industries can be found in West Papua Province, where one of the underdeveloped areas in the province is the Sorong City. Therefore, a study was conducted to determine the application of decision support methods in selecting micro-enterprises in Sorong that are eligible for business funding. The decision support method chosen is the collaboration between the Rank-Order Centroid (ROC) method, Technique for Order Preference by Similarity to Ideal Solution (TOPSIS), Weight Product (WP), and Elimination Et Choix Traduisant la Realite (Electre). With the analysis conducted on 10 samples of micro-enterprises in Sorong City, it was found that the micro-enterprises that were most eligible to receive assistance is Raya Helm based on ROC-TOPSIS, ROC-WP, and ROC-Electre. Then, sensitivity analysis results the ROC-Electre as the best method with the highest sensitivity percentage. Therefore, the implementation of these methods for supporting the funding decision to micro-enterprises in Sorong was successfully carried out with the output being the micro-enterprise rating results. Citation: The Journal of Defense Modeling and Simulation PubDate: 2024-03-26T03:14:55Z DOI: 10.1177/15485129241235681
- Measuring operational cognitive readiness of military personnel using
Joint Theater Level Simulation System (JTLS)-
Free pre-print version: Loading...
Rate this result:
What is this?
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Hasmady Alim, Ananthan Subramaniam, Norazman Mohamad Nor, Amelia Yuliana Abd Wahab Abstract: The Journal of Defense Modeling and Simulation, Ahead of Print. Cognitive Readiness refers to military personnel who are cognitively ready to perform effective and efficient roles in military operations with the necessary knowledge, skills, and abilities (KSAs). These KSAs are essential for critical thinking, problem-solving and decision-making. Military personnel at each level in the Malaysian Armed Forces (MAF) must be cognitively ready for military deployment. To enhance the cognitive readiness of military personnel at the operational level, a training design—scenario-based training (SBT) has been developed by the Malaysian Armed Forces Staff College (MAFSC) to develop cognitive readiness for course participants (CPs) who attended staff courses. Joint Theater Level Simulation (JTLS) has been used to analyze the Line of Operation (LOO) that has been produced by the course participant. The results show that SBT affected the development of cognitive readiness to prepare military personnel at the operational level through Joint Warfare environment exercises and tested by Modeling and Simulation (M&S). Citation: The Journal of Defense Modeling and Simulation PubDate: 2024-03-23T05:02:05Z DOI: 10.1177/15485129241239669
- Using combat simulations to determine tactical responses to new
technologies on the battlefield-
Free pre-print version: Loading...
Rate this result:
What is this?
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Vikram Mittal, James E Fenn Abstract: The Journal of Defense Modeling and Simulation, Ahead of Print. Although military technology can provide a tactical edge in combat, its efficacy often diminishes once the opposing force adapts. To address this issue, the study proposes a systematic approach to predict, model, and quantify the responses of soldiers on the battlefield to new technology. The method uses virtual simulations to identify changes in behavior and tactics, which are then modeled in constructive simulations to quantify lethality, survivability, and mission effectiveness. The approach is demonstrated through a case study on grenade-equipped quadcopters using the Infantry Warrior Simulation, a constructive simulation, and Virtual Battlespace 3.0, a virtual simulation. The study found that this tactic was initially successful at disrupting operations of soldiers. However, after seven iterations, the soldiers implemented changes in their tactics to minimize the effects of the drone. This process provides insight into better understanding the dynamic, responsive nature of the modern battlefield. Citation: The Journal of Defense Modeling and Simulation PubDate: 2024-03-23T04:56:46Z DOI: 10.1177/15485129241239364
- Applying complex adaptive systems research results to combat simulations
of the generation-after-next-
Free pre-print version: Loading...
Rate this result:
What is this?
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Matthew T K Koehler, Jose L Bricio-Neto, Ernest H Page, Andreas Tolk Abstract: The Journal of Defense Modeling and Simulation, Ahead of Print. Combat has seen fundamental changes over the past century—with new domains of warfighting (e.g., cyber, space); the introduction of nuclear and precision weapons; ubiquitous, all source intelligence; mixes of national, coalition, and private forces operating; and numerous other examples. Over this same period, combat simulations, and the attendant training, experimentation, and analyses they support, have increased in scale, scope, and resolution. But with respect to their fundamental effectiveness, have they substantively moved beyond the foundation created by Lanchester in the early 20th century' Differential equations of mean field approximations have been complemented by discrete-event simulations at many scales; however, the underlying conceptual framework of force-on-force conflict and tightly constrained, potentially fragile, service-specific command and control remains. In this position paper, we argue that new conceptualizations, better aligned with the modern warfighting landscape, are needed across all applications of military modeling. We examine the potential role of complex adaptive systems in this endeavor. Citation: The Journal of Defense Modeling and Simulation PubDate: 2024-03-08T10:43:07Z DOI: 10.1177/15485129241233608
- Analyzing daily sorties at NAS Kingsville utilizing alternative refueling
methods-
Free pre-print version: Loading...
Rate this result:
What is this?
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Ryan Teuschl, Joseph Foraker, Scott Simpson, Anna Svirsko Abstract: The Journal of Defense Modeling and Simulation, Ahead of Print. Training Air Wing TWO (TW-2) is responsible for the intermediate and advanced phases of Undergraduate Jet Pilot Training and provides the US Navy and Marine Corps with newly winged aviators. The objective of this study is to improve daily operations at TW-2 using sortie output and aircraft refuel waiting time as measures of performance. We define a sortie as any flight event attempted on the daily flight schedule to facilitate student training. We create a discrete-event simulation to model daily jet flow and operations at TW-2. We compare current operations with several alternative refueling strategies that incorporate hot pit refueling to minimize the time jets spend on the ground between consecutive sorties. We consider different factors and run a variety of experiments to determine the impact of various fueling strategies on resource utilization rates in an effort to generate more sorties. Our analysis finds that TW-2 can increase daily sortie throughput by an average of 60 sorties by incorporating both hot pit and cold refueling. We recommend using two hot pits to decrease the yearly idle fuel-burn cost by over $342,000 and reclaim a value of $98,422,500 from the annual maintenance contract at TW-2. Citation: The Journal of Defense Modeling and Simulation PubDate: 2024-03-08T10:05:18Z DOI: 10.1177/15485129241236447
- Military camouflaged object detection with deep learning using dataset
development and combination-
Free pre-print version: Loading...
Rate this result:
What is this?
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Kyo-Seong Hwang, Jungmok Ma Abstract: The Journal of Defense Modeling and Simulation, Ahead of Print. Camouflaged object detection (COD) is one of the emerging artificial intelligence technologies. COD identifies objects that require attention and time to detect with human eyes due to the similarity in texture or color to the surrounding environment. Despite the importance of camouflage and its detection in military, there is a lack of military camouflaged object detection research. Previous studies point out that the general COD has not been well studied due to the lack of camouflaged datasets, and the situation is worse in the military domain. This study aims at tackling the challenge in two directions. First, we carefully assemble the military camouflaged object (MCAM) dataset, including camouflaged soldiers and people as well as camouflaged military supplies for military COD. The experiment shows that MCAM can generate better performance results than the other benchmark datasets (CAMO, COD10K). Second, military (MCAM) and nonmilitary camouflage datasets (benchmark datasets) are combined and tested to overcome data scarcity. The experiment shows that the nonmilitary camouflage datasets are effective for military COD at a certain level, and a proper combination of military and nonmilitary camouflage datasets can improve the detection performance. Citation: The Journal of Defense Modeling and Simulation PubDate: 2024-02-24T04:34:42Z DOI: 10.1177/15485129241233299
- Variable-fidelity sensors and observer uncertainty using touring
multi-body periodic orbits to conduct cislunar SSA: preliminary study-
Free pre-print version: Loading...
Rate this result:
What is this?
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Joshua M Block, Adam P Wilmer, Robert A Bettinger, David H Curtis, Benjamin J Johnis Abstract: The Journal of Defense Modeling and Simulation, Ahead of Print. An accelerating interest in cislunar space and lunar orbit for civilian, commercial, and scientific missions requires a space situational awareness (SSA) architecture extending beyond geosynchronous orbit to promote space traffic management and safety. Space-based SSA in cislunar space is challenging due to difficulties associated with accurately estimating the position of the surveillance satellite, which is a foundational requirement for effectively performing the general SSA mission. Using multiple surveillance satellites with lower-fidelity sensors helps alleviate these concerns by aggregating multiple data sets with higher variance to achieve the same level or potentially improved accuracy as compared to fewer higher-quality sensors. A subset of Earth–Moon periodic orbits, herein identified as “touring” orbits, are used for an optical surveillance constellation with a target resident space object (RSO) in a L1 Halo orbit. Angles-only measurement data are processed utilizing an extended Kalman filter to estimate the position of the RSO. The analysis focuses on assessing the effectiveness of different numbers of surveillance satellites using touring cislunar periodic orbits for conducting the SSA mission relative to L1. Overall, this study finds that the use of an SSA constellation with low-fidelity sensors can match the performance achieved by a constellation featuring higher-fidelity sensors and reduced observer uncertainty for the observer orbits examined. Citation: The Journal of Defense Modeling and Simulation PubDate: 2024-02-24T04:31:32Z DOI: 10.1177/15485129231225270
- Statistical modeling of cargo securing on selected military trucks and
road surfaces-
Free pre-print version: Loading...
Rate this result:
What is this?
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Jiri Neubauer, Martin Vlkovsky, Jaroslav Michalek Abstract: The Journal of Defense Modeling and Simulation, Ahead of Print. The development of new technologies (e.g., three-axial accelerometers) and their implementation to the armed forces made it possible to rather easily obtain data on transportation with regard to cargo securing. It is, however, crucial to evaluate the data, and identify the factors important for the selection of an appropriate cargo securing system. Particular attention should be paid to the transportation on low-quality roads, or possibly in the terrain as it can be expected that the cargo (as well as the vehicle and the driver) is subjected to greater shocks. Data obtained from the military transport experiment have been processed using advanced statistical methods (a contaminated probability distribution, methods of statistical comparison, and an analysis of variance). The transportation data from the use of two military trucks on three different road surfaces has been compared. The results show, in which axes there are statistically significant differences in terms of the frequency of exceeding normatively determined acceleration coefficient values in relation to the road surface type and the vehicle type. Further results are based on the modeling of acceleration coefficients using a contaminated log-normal distribution, where the distribution of acceleration coefficient values is contaminated by outliers resulting from sudden changes in the transport conditions. Citation: The Journal of Defense Modeling and Simulation PubDate: 2024-01-23T11:21:40Z DOI: 10.1177/15485129241227012
- Renormalization theory and wargaming: multi-layered wargames
-
Free pre-print version: Loading...
Rate this result:
What is this?
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Peter Dobias Abstract: The Journal of Defense Modeling and Simulation, Ahead of Print. Generally speaking, wargames are tools for exploring human decision-making in an environment with incomplete and imperfect information. They can provide important insights into the complexity of military operations or can be used to generate novel ideas. However, if an analyst desired to conduct analyses spanning multiple warfare levels, the only feasible approach would be to select the largest domain and the highest resolution to accommodate even the smallest scales involved. This paper develops a theoretical framework based on the renormalization theory for a multi-layered approach to wargaming. This approach would enable representing variety of warfare scales within a single wargame, while avoiding the overhead that would have arisen from trying to represent desired scenarios at the highest required temporary and spatial scales. The proposal of a conceptual framework for multi-scale wargaming is demonstrated on a simplest possible example of hybrid wargames used in support of NATO concept development. Citation: The Journal of Defense Modeling and Simulation PubDate: 2024-01-08T09:00:50Z DOI: 10.1177/15485129231220681
|