Receive a digest of the latest in cybersecurity and information systems straight to your inbox
Technical Research and Analysis Services
The Cybersecurity & Information Systems Information Analysis Center (CSIAC) is a component of the U.S. Department of Defense’s Information Analysis Center (IAC) enterprise.
Technical Focus Areas
What We Do
As a DoDIAC, we provide a number of resources and services to help you in your research and provide you with focused expert assistance and unbiased scientific and technical information.
Stay up to date with our Digest
Recent Inquiries
What is the current state of the art for tire terrain interface models for automotive simulations, and do the current models allow for digital terrain models (DTMs), digital surface models (DSMs), or digital elevation models (DEMs) to be used as road or trail input?
What is the current state of the art for tire terrain interface models for automotive simulations, and do the current models allow for digital terrain models (DTMs), digital surface models (DSMs), or digital elevation models (DEMs) to be used as road or trail input?
Are reinforcement learning techniques available for a next-generation threat system?
Are reinforcement learning techniques available for a next-generation threat system?
Who can provide information on getting approval to use something like NotebookLM on closed-loop U.S. Department of Defense (DoD) computers?
Who can provide information on getting approval to use something like NotebookLM on closed-loop U.S. Department of Defense (DoD) computers?
The DoD Cybersecurity Policy Chart
Captures the tremendous breadth of applicable cybersecurity policies in a helpful organizational scheme
Articles
Lantern: An Interactive Adversarial AI Workbench
Lantern, an innovative adversarial artificial intelligence (AI) workbench with unique features, is presented in this article. Lantern allows users to evaluate adversarial attacks quickly and interactively against artificial intelligence (AI) systems to protect them better.
Exploiting Alpha Transparency in Images to Manipulate AI Recommender Systems
This article examines the vulnerability of artificial intelligence (AI) systems to alpha transparency attacks through a simulated cyber tabletop scenario. The research demonstrates how manipulated images with hidden content in alpha layers can exploit the discrepancy between human and machine perception and compromise various AI-driven technologies from social media algorithms to critical infrastructure analysis.
Implementing Cybersecurity Solutions for Space Network Protection
This article focuses on improving the security of space networks by using multiple layers of protection to guard against cyberthreats and ensure the systems remain strong and reliable. It highlights the need for new encryption methods for smaller satellites, which have limited hardware capabilities, to keep their data safe. The study emphasizes the defense-in-depth model, which involves using several independent security measures to protect against different types of attacks.
Ready to submit a technical inquiry?
Receive free information research on technical topics