Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
graphic of a computer screen with dials on it

A Relevance Model for Threat-Centric Ranking of Cybersecurity Vulnerabilities

The relentless process of tracking and remediating vulnerabilities is a top concern for cybersecurity professionals. The key challenge is trying to identify a remediation scheme specific to in-house, organizational objectives. Without a strategy, the result is a patchwork of fixes applied to a tide of vulnerabilities, any one of which could be the point of failure in an otherwise formidable defense. Given that few vulnerabilities are a focus of real-world attacks, a practical remediation strategy is to identify vulnerabilities likely to be exploited and focus efforts toward remediating those vulnerabilities first.

digital image of king chess piece with binary digits on it

Transforming Military Leadership and Organizational Health With Artificial Intelligence

Artificial intelligence (AI) fuels not only the technological advancements in our businesses and homes but also redefines the operational frameworks of governments, military, and the broader societal constructs. The essence of this transformative power, however, finds its most compelling narrative in leadership and organizational health, where machine learning (ML), a subset of AI, plays a pivotal role. AI/ML can be used to support leaders in their efforts to manage and monitor initiatives and drive decisions. ML algorithms using continuous data collection activities can assist and support organization’s leaders through understanding if implemented initiatives are impacting operations by improving staff cross-collaboration and productivity while improving product and service innovation. Using predictive analytics to analyze trending data to predict future outcomes, leaders can determine if staying the course or pivoting in a certain direction is needed.

graphic of 4 pillars/columns

Development, Test, and Evaluation of Small-Scale Artificial Intelligence Models

As data becomes more commoditized across all echelons of the U.S. Department of Defense, developing artificial intelligence/machine-learning (AI/ML) solutions allows for advanced data analysis and processing. However, these solutions require intimate knowledge of the relevant data as well as robust test and evaluation (T&E) procedures to ensure performance and trustworthiness. This article presents a case study and recommendations for developing and evaluating small-scale AI solutions. The model automates an acoustic event location system.

two artificial intelligence heads, one red, one blue, looking at each other

Artificial Intelligence as a Force Multiplier in U.S. Military Information Campaigns

Military commanders have used information throughout warfare to influence, mislead, disrupt, or otherwise affect the enemy’s decision-making and capabilities. This article discusses the history of information operations (IOs) and enduring importance of incorporating actions in the information environment in military strategy.

Note From the Editor-in-Chief

Artificial intelligence (AI) and machine learning (ML) represent an increasingly exciting field of computer science. A term originally coined by John McCarthy in 1956,1 AI is becoming increasingly pervasive in today’s world.

graphic red network lines

NSA, FBI, CISA, and Allies Issue Advisory About Russian Military Cyber Actors

FORT MEADE, Md. – The National Security Agency (NSA) joins the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure…

eight-inch wafer that can selectively reflect different colors of light

Lighting the Way for Quantum Innovation

ALBUQUERQUE, N.M. — Sandia National Laboratories and Arizona State University, two research powerhouses, are collaborating to push the boundaries of…

ORNL's Moe Khaleel, left, associate laboratory director for national security sciences, and Maurice Singleton III, chief executive officer of U2opia Technology, celebrate the partnership between Oak Ridge National Laboratory and U2opia Technology. Credit: Carlos Jones/ORNL, U.S. Dept. of Energy

U2opia Signs License to Commercialize Anomaly-Detection Technology for Cybersecurity

U2opia Technology has licensed Situ and Heartbeat, a package of technologies from the Department of Energy’s Oak Ridge National Laboratory…

Air Force Gen. Timothy Haugh, commander of U.S. Cyber Command and director of the National Security Agency, gives the opening remarks at the Cyber Command’s Legal Conference at Joint Base Andrews, Md., Aug. 9, 2024.

AI Security Center Keeps DoD at Cusp of Rapidly Emerging Technology

The director of the National Security Agency said the agency’s new Artificial Intelligence Security Center is paying dividends in the…

U.S. Cyber Command seal

USCYBERCOM Unveils AI Roadmap for Cyber Operations

FORT GEORGE G. MEADE, Md.   –  Mr. Michael Clark, deputy director of plans and policy at U.S. Cyber Command, presented a…

codebreaker challenge graphic

NSA Launches 11th Annual Codebreaker Challenge for 2024

FORT MEADE, Md. – The National Security Agency (NSA) is launching its annual Codebreaker Challenge, offering students from U.S.-based academic…

binary-cad-design-of-part

CRWS-BoK Portal

The U.S. Department of Defense announced the release of Version 4.2 of the Online Cyber Resilient Weapon Systems Body of…