{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:12:12Z","timestamp":1757617932307,"version":"3.44.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031873447"},{"type":"electronic","value":"9783031873454"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87345-4_25","type":"book-chapter","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:34:10Z","timestamp":1745800450000},"page":"383-396","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["JASPER: An Agent-Based Simulation Tool for\u00a0Test and\u00a0Evaluation of\u00a0Jammer-Angle Allocation Algorithms"],"prefix":"10.1007","author":[{"given":"Ahmet Burak","family":"Barakl\u0131","sequence":"first","affiliation":[]},{"given":"Okan","family":"Top\u00e7u","sequence":"additional","affiliation":[]},{"given":"Halit","family":"O\u011fuzt\u00fcz\u00fcn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,29]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"151531","DOI":"10.1109\/ACCESS.2021.3125620","volume":"9","author":"H Alghodhaifi","year":"2021","unstructured":"Alghodhaifi, H., Lakshmanan, S.: Autonomous vehicle evaluation: a comprehensive survey on modeling and simulation approaches. IEEE Access 9, 151531\u2013151566 (2021)","journal-title":"IEEE Access"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.trf.2017.08.004","volume":"61","author":"M Aramrattana","year":"2019","unstructured":"Aramrattana, M., Larsson, T., Jansson, J., N\u00e5bo, A.: A simulation framework for cooperative intelligent transport systems testing and evaluation. Transport. Res. F: Traffic Psychol. Behav. 61, 268\u2013280 (2019)","journal-title":"Transport. Res. F: Traffic Psychol. Behav."},{"issue":"4","key":"25_CR3","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1109\/TAC.1987.1104607","volume":"32","author":"M Athans","year":"1987","unstructured":"Athans, M.: Command and control (C2) theory: a challenge to control science. IEEE Trans. Autom. Control 32(4), 286\u2013293 (1987)","journal-title":"IEEE Trans. Autom. Control"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Balci, O.: Principles and techniques of simulation validation, verification, and testing. In: Proceedings of the 27th Conference on Winter Simulation, pp. 147\u2013154 (1995)","DOI":"10.1145\/224401.224456"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Barakl\u0131, A.B., Semiz, F., Atasoy, E.: The specialized threat evaluation and weapon target assignment problem: genetic algorithm optimization and ILP model solution. In: International Conference on the Applications of Evolutionary Computation (Part of EvoStar), pp. 19\u201334. Springer, Cham (2023)","DOI":"10.1007\/978-3-031-30229-9_2"},{"key":"25_CR6","unstructured":"Bellifemine, F., Poggi, A., Rimassa, G.: JADE\u2013a FIPA-compliant agent framework. In: Proceedings of PAAM, vol.\u00a099, p.\u00a033. London (1999)"},{"key":"25_CR7","unstructured":"Borshchev, A., Filippov, A.: From system dynamics and discrete event to practical agent based modeling: reasons, techniques, tools. In: Proceedings of the 22nd International Conference of the System Dynamics Society, vol.\u00a022, pp. 25\u201329. Oxford, England (2004)"},{"issue":"3","key":"25_CR8","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/S1004-4132(06)60097-2","volume":"17","author":"H Cai","year":"2006","unstructured":"Cai, H., Liu, J., Chen, Y., Wang, H.: Survey of the research on dynamic weapon-target assignment problem. J. Syst. Eng. Electron. 17(3), 559\u2013565 (2006)","journal-title":"J. Syst. Eng. Electron."},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Cai, W., Song, X., Liu, C., Jiang, D., Huo, L.: An adaptive and efficient network traffic measurement method based on SDN in IoT. In: International Conference on Simulation Tools and Techniques, pp. 64\u201374. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-97124-3_6"},{"issue":"1","key":"25_CR10","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1111\/j.1559-3584.1993.tb02704.x","volume":"105","author":"RL Carling","year":"1993","unstructured":"Carling, R.L.: A knowledge-base system for the threat evaluation and weapon assignment process. Nav. Eng. J. 105(1), 31\u201341 (1993)","journal-title":"Nav. Eng. J."},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Carson, J.S.: Introduction to modeling and simulation. In: Proceedings of the Winter Simulation Conference, pp. 8\u2013pp. IEEE (2005)","DOI":"10.1109\/WSC.2004.1371297"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Choi, S.Y., Park, K., Yang, J.H., Kang, H.I.: Application of agent-based multimethod simulation approach to the simulation testbed prototype for the concept exploration and requirement analysis of UGV. In: ECMS, pp. 57\u201363 (2015)","DOI":"10.7148\/2015-0057"},{"key":"25_CR13","unstructured":"G\u00fcl, K.: Model and procedures for the jammer and target allocation problem. Master\u2019s thesis, Middle East Technical University (2018)"},{"key":"25_CR14","unstructured":"Hosein, P.A.: A class of dynamic nonlinear resource allocation problems. Ph.D. thesis, Massachusetts institute of technology (1989)"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Hosein, P.A., Athans, M., et\u00a0al.: Some analytical results for the dynamic weapon-target allocation problem (1990)","DOI":"10.21236\/ADA219280"},{"key":"25_CR16","unstructured":"Johansson, F., Falkman, G.: A Bayesian network approach to threat evaluation with application to an air defense scenario. In: 2008 11th International Conference on Information Fusion, pp.\u00a01\u20137. IEEE (2008)"},{"issue":"6","key":"25_CR17","doi-asserted-by":"publisher","first-page":"1759","DOI":"10.1016\/j.cor.2006.09.011","volume":"35","author":"O Karasakal","year":"2008","unstructured":"Karasakal, O.: Air defense missile-target allocation models for a naval task group. Comput. Oper. Res. 35(6), 1759\u20131770 (2008)","journal-title":"Comput. Oper. Res."},{"key":"25_CR18","unstructured":"Lloyd, S.P., Witsenhausen, H.S.: Weapons allocation is NP-complete. In: 1986 Summer Computer Simulation Conference, pp. 1054\u20131058 (1986)"},{"key":"25_CR19","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-319-27343-3_3","volume-title":"Multiagent System Technologies","author":"F Lorig","year":"2015","unstructured":"Lorig, F., Dammenhayn, N., M\u00fcller, D.-J., Timm, I.J.: Measuring and comparing scalability of agent-based simulation frameworks. In: M\u00fcller, J.P., Ketter, W., Kaminka, G., Wagner, G., Bulling, N. (eds.) MATES 2015. LNCS (LNAI), vol. 9433, pp. 42\u201360. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27343-3_3"},{"issue":"7","key":"25_CR20","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1177\/0037549705058073","volume":"81","author":"S Luke","year":"2005","unstructured":"Luke, S., Cioffi-Revilla, C., Panait, L., Sullivan, K., Balan, G.: Mason: a multiagent simulation environment. Simulation 81(7), 517\u2013527 (2005)","journal-title":"Simulation"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Macal, C., North, M.: Introductory tutorial: agent-based modeling and simulation. In: Proceedings of the Winter Simulation Conference 2014, pp. 6\u201320. IEEE (2014)","DOI":"10.1109\/WSC.2014.7019874"},{"key":"25_CR22","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1016\/j.procs.2018.04.137","volume":"130","author":"Y Mualla","year":"2018","unstructured":"Mualla, Y., Bai, W., Galland, S., Nicolle, C.: Comparison of agent-based simulation frameworks for unmanned aerial transportation applications. Procedia Comput. Sci. 130, 791\u2013796 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"25_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2194-3206-1-1","volume":"1","author":"MJ North","year":"2013","unstructured":"North, M.J., et al.: Complex adaptive systems modeling with repast simphony. Complex Adaptive Syst. Model. 1, 1\u201326 (2013)","journal-title":"Complex Adaptive Syst. Model."},{"key":"25_CR24","doi-asserted-by":"publisher","first-page":"42635","DOI":"10.1109\/ACCESS.2021.3065926","volume":"9","author":"S Park","year":"2021","unstructured":"Park, S., Kim, H.T., Lee, S., Joo, H., Kim, H.: Survey on anti-drone systems: components, designs, and challenges. IEEE Access 9, 42635\u201342659 (2021)","journal-title":"IEEE Access"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Puzicha, A., Buchholz, P.: A simulation environment for autonomous robot swarms with limited communication skills. In: Simulation Tools and Techniques: 12th EAI International Conference, SIMUtools 2020, Guiyang, China, 28\u201329 August 2020, Proceedings, Part II 12, pp. 206\u2013226. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-72795-6_17"},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Rothenberg, J.: Object-oriented simulation: where do we go from here? In: Proceedings of the 18th Conference on Winter Simulation, pp. 464\u2013469 (1986)","DOI":"10.1145\/318242.318478"},{"issue":"4","key":"25_CR27","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MCOM.2018.1700430","volume":"56","author":"X Shi","year":"2018","unstructured":"Shi, X., Yang, C., Xie, W., Liang, C., Shi, Z., Chen, J.: Anti-drone system with multiple surveillance technologies: architecture, implementation, and challenges. IEEE Commun. Mag. 56(4), 68\u201374 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"25_CR28","doi-asserted-by":"crossref","unstructured":"Tyurin, V., Martyniuk, O., Mirnenko, V., Open\u2019ko, P., Korenivska, I.: General approach to counter unmanned aerial vehicles. In: 2019 IEEE 5th International Conference Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD), pp. 75\u201378. IEEE (2019)","DOI":"10.1109\/APUAVD47061.2019.8943859"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Simulation Tools and Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87345-4_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T13:59:33Z","timestamp":1757167173000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87345-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031873447","9783031873454"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87345-4_25","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"29 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIMUtools","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Simulation Tools and Techniques","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bratislava","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovakia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"simutools2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/simutools.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}