共 12 条
[1]
[Anonymous], ANYLOGIC
[2]
Ashiku L, 2019, 2019 14TH ANNUAL CONFERENCE SYSTEM OF SYSTEMS ENGINEERING (SOSE), P140, DOI [10.1109/sysose.2019.8753872, 10.1109/SYSOSE.2019.8753872]
[3]
Boccara N, 2010, GRAD TEXTS PHYS, P1, DOI 10.1007/978-1-4419-6562-2
[4]
Calkins H, 2017, J ARRYTHM, V33, P369, DOI 10.1016/j.joa.2017.08.001
[5]
Grigoryev I, 2012, ANYLOGIC N AM
[6]
Ibnugraha Prajna Deshanta, 2018, 2018 International Conference on Information and Communications Technology (ICOIACT), P275, DOI 10.1109/ICOIACT.2018.8350675
[7]
Moschovitis C., 2018, Cybersecurity Program Development for Business: The Essential Planning Guide
[8]
Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)
[9]
Ucedavelez T, 2015, RISK CENTRIC THREAT MODELING: PROCESS FOR ATTACK SIMULATION AND THREAT ANALYSIS, P1, DOI 10.1002/9781118988374
[10]
Wagner N., 2015, Proceedings of the Symposium on Agent-Directed Simulation, P18