Journal of Defense Management : Citations & Metrics Report
Articles published in Journal of Defense Management have been cited by esteemed scholars and scientists all around the world. Journal of Defense Management has got h-index 6, which means every article in Journal of Defense Management has got 6 average citations.
Following are the list of articles that have cited the articles published in Journal of Defense Management.
2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | |
---|---|---|---|---|---|---|---|
Total published articles |
33 | 33 | 4 | 5 | 9 | 14 | 20 |
Conference proceedings |
0 | 0 | 0 | 0 | 0 | 0 | 0 |
Citations received as per Google Scholar, other indexing platforms and portals |
85 | 62 | 78 | 37 | 39 | 21 | 6 |
Journal total citations count | 373 |
Journal impact factor | 2.3 |
Journal 5 years impact factor | 3.6 |
Journal cite score | 4.3 |
Journal h-index | 6 |
Journal h-index since 2019 | 5 |
Important citations (315)
Guendel, r. e., kuffner, m. p., & maki, d. e. (2017). a model of unmanned aircraft pilot detect and avoid maneuver decisions. mit lincoln laboratory lexington united states. |
|
Shin, h., lee, j., kim, h., & shim, d. h. (2018). an autonomous aerial combat framework for two-on-two engagements based on basic fighter maneuvers. aerospace science and technology, 72, 305-315. |
|
Zhang, x., liu, g., yang, c., & wu, j. (2018). research on air confrontation maneuver decision-making method based on reinforcement learning. electronics, 7(11), 279. |
|
Changqiang, h. u. a. n. g., kangsheng, d. o. n. g., hanqiao, h., shangqin, t. a. n. g., & zhuoran, z. h. a. n. g. (2018). autonomous air combat maneuver decision using bayesian inference and moving horizon optimization. journal of systems engineering and electronics, 29(1), 86-97. |
|
Fleck, d. e., ernest, n., adler, c. m., cohen, k., eliassen, j. c., norris, m., ... & strakowski, s. m. (2017). prediction of lithium response in first?episode mania using the lithium intelligent agent (lithia): pilot data and proof?of?concept. bipolar disorders, 19(4), 259-272. |
|
Haldane, a. g., & turrell, a. e. (2019). drawing on different disciplines: macroeconomic agent-based models. journal of evolutionary economics, 29(1), 39-66. |
|
Ramamoorthy, a., & yampolskiy, r. (2018). beyond mad? the race for artificial general intelligence. itu j, 1, 1-8. |
|
Aha, d. w. (2018). goal reasoning: foundations, emerging applications, and prospects. ai magazine, 39(2), 3-24. |
|
Payne, k. (2018). artificial intelligence: a revolution in strategic affairs?. survival, 60(5), 7-32. |
|
Radmanesh, m., kumar, m., guentert, p. h., & sarim, m. (2018). overview of path-planning and obstacle avoidance algorithms for uavs: a comparative study. unmanned systems, 6(02), 95-118. |
|
Haldane, a. g., & turrell, a. e. (2018). an interdisciplinary model for macroeconomics. oxford review of economic policy, 34(1-2), 219-251. |
|
Hagendorff, t. (2020). the ethics of ai ethics: an evaluation of guidelines. minds and machines, 30(1), 99-120. |
|
Allen, g., & chan, t. (2017). artificial intelligence and national security. cambridge, ma: belfer center for science and international affairs. |
|
jargin sv. overpopulation and regional conflicts. moscow state university, russia. 2019. |
|
Oboh, c. a. (2018). corporate social responsibility and the welfare of nigerian niger delta landowners (doctoral dissertation, walden university). |
|
Ijabadeniyi, a. (2018). exploring corporate marketing optimisation strategies for the kwazulu-natal manufacturing sector: a corporate social responsibility perspective (doctoral dissertation). |
|
Gavrila, r. m. (2019). factors leading corporations to continue to engage in corporate social responsibility initiatives (doctoral dissertation, walden university). |
|
Saniel, j. j. (2018, october). conceptualizations on femininity and identified issues in women. in fifth international conference on women & gender studies 2018 (p. 80). |
|
Kapur, r. factors influencing the status of women in india. |
|
nazir s, ghazanfar ma, aljohani nr, azam ma, alowibdi js. data analysis to uncover intruder attacks using data mining techniques. in2017 5th international conference on information and communication technology, melaka , malaysia. 2017; 1-6. |
|