ABSTRACT

Operations research (OR) is a core discipline in military and defense management. Coming to the forefront initially during World War II, OR provided critical contributions to logistics, supply chains, and strategic simulation, while enabling superior decision-making for Allied forces. OR has grown to include analytics and many applications, including artificial intelligence, cybersecurity, and big data, and is the cornerstone of management science in manufacturing, marketing, telecommunications, and many other fields.

The Handbook of Military and Defense Operations Research presents the voices leading OR and analytics to new heights in security through research, practical applications, case studies, and lessons learned in the field.

Features

  • Applies the experiences of educators and practitioners working in the field
  • Employs the latest technology developments in case studies and applications
  • Identifies best practices unique to the military, security, and national defense problem space
  • Highlights similarities and dichotomies between analyses and trends that are unique to military, security, and defense problems.

part Section I|266 pages

Approaches

chapter Chapter 1|16 pages

Modern Data Analytics for the Military Operational Researcher

ByRaymond R. Hill

chapter Chapter 2|36 pages

Microsoft Excel: The Universal Tool of Analysis

ByJoseph M. Lindquist, Charles A. Sulewski

chapter Chapter 3|28 pages

Multiattribute Decision Modeling in Defense Applications

ByRoger Chapman Burk

chapter Chapter 4|30 pages

Military Workforce Planning and Manpower Modeling

ByNathaniel D. Bastian, Andrew O. Hall

chapter Chapter 5|26 pages

Military Assessments

ByLynette M.B. Arnhart, Marvin L. King III

chapter Chapter 6|16 pages

Threatcasting in a Military Setting

ByNatalie Vanatta, Brian David Johnson

chapter Chapter 7|16 pages

Analytical Modeling of Stochastic Systems

ByRoger Chapman Burk

chapter Chapter 8|22 pages

Modern Methods for Characterization of Social Networks through Network Models

ByChristine M. Schubert Kabban, Fairul Mohd-Zaid, Richard F. Deckro

chapter Chapter 9|26 pages

Process Optimization through Structured Problem Solving

ByDavid M. Bernacki, Robert E. Hamm, Hung-da Wan

chapter Chapter 10|26 pages

Simulation Optimization

ByShane N. Hall, Brian M. Wade, Benjamin G. Thengvall

chapter Chapter 11|22 pages

Analytical Test Planning for Defense Acquisitions

ByDarryl K. Ahner, Gina Sigler

part Section II|36 pages

Soft Skills and Client Relations

chapter Chapter 12|14 pages

Why Won’t They Use Our Model?

ByWalt DeGrange, Wilson L. Price

part Section III|90 pages

Applications

chapter Chapter 14|26 pages

A Model for and Inventory of Cybersecurity Values: Metrics and Best Practices

ByNatalie M. Scala, Paul L. Goethals

chapter Chapter 15|14 pages

Applying Information Theory to Validate Commanders’ Critical Information Requirements

ByMark A.C. Timms, David R. Mandel, Jonathan D. Nelson

chapter Chapter 16|32 pages

Modeling and Inferencing of Activity Profiles of Terrorist Groups

ByVasanthan Raghavan

chapter Chapter 17|16 pages

Expert COSYSMO Systems Engineering Cost Model and Risk Advisor

ByRaymond Madachy, Ricardo Valerdi

part Section IV|66 pages

Perspectives

chapter Chapter 18|12 pages

How Data Science Happens

ByJames P. Howard II

chapter Chapter 19|22 pages

Modernizing Military Operations Research Education to Form the Foundation for US Military Force Modernization

ByChris Arney, Michael Yankovich, Krista Watts

chapter Chapter 20|30 pages

Strategic Analytics and the Future of Military Operations Research

ByGreg H. Parlier