Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

DOD Demonstrates Mobile Microgrid Technology

The Office of the Undersecretary of Defense for Research and Engineering and the Department of the Army recently demonstrated a…

NSA, Cybercom Leader Says Efforts Have Expanded

Adversaries have heavily invested in cyberspace operations and capabilities. As such, cyber operations, cybersecurity and information operations are increasingly important…

Canadian Navy Team Wins DOD’s Annual Cyber Defense Exercise

A team from the Royal Canadian Navy came out on top in the Defense Department’s annual Cyber Flag 21-2 training…

Nellis AFB empowers warfighters via DevSecOps

-ELLIS AIR FORCE BASE, Nev. (AFNS) — The Department of the Air Force Rapid Capabilities Office is using multiple technologies to build…

Hypergaming for Cyber – Strategy for Gaming a Wicked Problem

Hypergaming analysis as a tool for examining conflicts, situations, and constructs has been used liberally throughout numerous environments for decades….

Can the “Gorilla” Deliver? Assessing the Security of Google’s New “Thread” Internet of Things (IoT) Protocol

Security incidents associated with Internet of Things (IoT) devices have recently gained high visibility, such as the Mirai botnet that…

Rebooting Letters of Marque for Private Sector, Active Cyber Defense

The views expressed in this paper are those of the author and do not reflect the official policy or position…

Evaluation of Comprehensive Taxonomies for Information Technology Threats

Categorization of all information technology threats can improve communication of risk for an organization’s decision-makers who must determine the investment…

Times Change and Your Training Data Should Too: The Effect of Training Data Recency on Twitter Classifiers

Sophisticated adversaries are moving their botnet command and control infrastructure to social media microblogging sites such as Twitter. As security…

Optimizing for Mission Success Using a Stochastic Gaming Simulation

This article describes how mission scenarios created using gaming software can be used as a graphical concept of operations (CONOPS)…

Enabling Joint Synthetic Training Interoperability Through Joint Federated Common Data Services

The Joint Training Enterprise (JTE) requires effective integration of and technical interoperability among disparate synthetic training capabilities from across the…

View and Viewpoint Based Digital Signoff Using OpenMBEE as an Authoritative Source of Truth

Following the DoD’s Digital Engineering (DE) strategy NAVAIR’s Systems Engineering Transformation (SET) Framework investigates the modeling, feasibility and collaboration with…