Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
graphic of a microchip with electric pulses coming from it

Low-Power Cybersecurity Attack Detection Using Deep Learning on Neuromorphic Technologies

Neuromorphic computing systems are desirable for several applications because they achieve similar accuracy to graphic processing unit (GPU)-based systems while consuming a fraction of the size, weight, power, and cost (SWaP-C). Because of this, the feasibility of developing a real-time cybersecurity system for high-performance computing (HPC) environments using full precision/GPU and reduced precision/neuromorphic technologies was previously investigated. This work was the first to compare the performance of full precision and neuromorphic computing on the same data and neural network and Intel and BrainChip neuromorphic offerings. Results were promising, with up to 93.7% accuracy in multiclass classification—eight attack types and one benign class.

graphic of a mountain with a flag on top

Extreme Zero Trust

Zero Trust Architecture (ZTA) has become a mainstream information security philosophy. Many commercial enterprises are in varying stages of their journeys in adopting and implementing ZTA. Similarly, federal policy has moved toward ZTA, motivated by actions such as Executive Order 14028 and guided by NIST 800-207 and CISA’s Zero Trust Maturity.

DigitalIDGuidelines_illustration_Concept-rev2

NIST Releases Second Public Draft of Digital Identity Guidelines for Final Review

GAITHERSBURG, Md. — When we need to show proof of identity, we might reach for our driver’s license — or…

DHS S&T Seeks Solutions for Software Artifact Dependency Graph Generation

WASHINGTON – The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) announced a new solicitation seeking Software Artifact…

USAF personnel looking at a computer screen

DISA’s DoDNet Program Office Drives Progress in the Next Pivotal Phase of Network Optimization

The Defense Information Systems Agency (DISA) is advancing the migration of users to its modernized network, DoDNet, as part of…

graphic of a tractor

Eliminating Memory Safety Vulnerabilities Once and for All

Memory safety vulnerabilities are the most prevalent type of disclosed software vulnerability and affect a computer’s memory in two primary…

NIST Releases First Three Finalized Post-Quantum Encryption Standards

GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has finalized its principal set…

graphic of lines and dots

Evaluating Trust and Safety of Large Language Models

Amid the skyrocketing popularity of large language models (LLMs), researchers at Lawrence Livermore National Laboratory are taking a closer look…

CISA Releases Secure by Demand Guide

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released the “Secure by Demand…

CELR test environment

Keeping Our Seaports Cyber Secure

A new cutting-edge Control Environment Laboratory Resource (CELR) platform developed by the Science and Technology Directorate (S&T) and Cybersecurity and…

city skyline with network graphics on top

CISA Releases Playbook for Infrastructure Resilience Planning

WASHINGTON – Today, the Cybersecurity and Infrastructure Security Agency (CISA) released a companion guide to the Infrastructure Resilience Planning Framework…

graphic depicting network and industry icons

NIST Announces Funding Opportunity for AI-Focused Manufacturing USA Institute

GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has announced an open competition…