Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
graphic of soldiers walking toward a mountain in the background with digital lines going past them

ARCYBER Data Management and Analytics Directorate

FORT EISENHOWER, GA – Army Cyber Command (ARCYBER), the Army’s premier force for data-centric operations, is committed to implementing the…

NIST Finalizes Guidelines for Evaluating “Differential Privacy” Guarantees to De-identify Data

How can we glean useful insights from databases containing confidential information while protecting the privacy of the individuals whose data…

Army Releases Version 2.0 of Its Unified Network Plan

WASHINGTON – The U.S. Army has released its Army Unified Network Plan (AUNP) 2.0. While the first AUNP, published in…

NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption

Last year, NIST standardized a set of encryption algorithms that can keep data secure from a cyberattack by a future…

digital airplane superimposed over conference meeting

Supporting International Partners in Aviation Cybersecurity

As companies worldwide switch from analog to automated digital industrial control systems, malicious cyber actors are finding new opportunities for…

data center at NREL

Reducing Data Center Peak Cooling Demand and Energy Costs With Underground Thermal Energy Storage

As the demand for U.S. data centers grows with the expansion of artificial intelligence, Cloud services, and big data analytics,…

abstract ai head with colorful circuit lines

Training Synthetic AI Agents to Work (Well) With Humans

Synthetic entities in military simulations often fall short of expectations. They rely on rule-based or reactive computational models, which are…

Spanning eight rows and occupying the space of two professional basketball courts, Aurora is one of the largest supercomputer installations to date. (Image by Argonne National Laboratory.)

Argonne Releases Aurora Exascale Supercomputer to Researchers, Enabling Accelerated Science

The U.S. Department of Energy’s (DOE’s) Argonne National Laboratory has released its Aurora exascale supercomputer to researchers across the world,…

CISA Secure by Design logo

Secure by Design Alert: Eliminating Buffer Overflow Vulnerabilities

Buffer overflow vulnerabilities are a prevalent type of memory safety software design defect that regularly leads to system compromise. The…

An artist’s representation of a hole etched into alternating layers of silicon oxide and silicon nitride using plasma, which is used to make 3D NAND flash memory. Researchers want to refine how they make these holes so each one is deep, narrow and vertical, with smooth sides. (Image credit: Kyle Palmer / PPPL Communications Department)

Improving the Way Flash Memory Is Made

To store ever more data in electronic devices of the same size, the manufacturing processes for these devices need to…

program-red-c-logo

Watch Out for the Bus!

In an imperfect world, the prospect of having a computer, or any bus-based system, that can defend itself from cyber-attacks…

blue circuit lines

Joint Publications Focus on Mitigation Strategies for Edge Devices

FORT MEADE, MD – The National Security Agency (NSA) has joined the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s…