Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Game Theoretic Modeling of Advanced Persistent Threat in Internet of Things

Cyber-Physical Systems (CPS) and Internet of Things (IoT) devices such as sensors, wearable devices, robots, drones, and autonomous vehicles facilitate…

Software Defined Networking for Army’s Tactical Network: Promises, Challenges, and an Architectural Approach

Software Defined Networking (SDN) and Network Function Virtualization (NFV) together promise to revolutionize the networking with unprecedented improvements in the…

A New Reality: Modelling & Simulation as a Service

NATO and nations use simulation environments for various purposes, such as training, capability development, mission rehearsal and decision support in…

Container Intrusions: Assessing the Efficacy of Intrusion Detection and Analysis Methods for Linux Container Environments

The unique and intrinsic methods by which Linux application containers are created, deployed, networked, and operated do not lend themselves…

Cultivating Cybersecurity Talent Internally

As the number of unprecedented cyberthreats continues to rise, correspondingly the demand for cybersecurity professionals continues to surge in both…

Learning to Win: Making the Case for Autonomous Cyber Security Solutions

Machine learning is revolutionizing many industries and forever changing how we interact with computer systems and each other. The revolution…

The Elusive Nature of “Key Cyber Terrain”

The concept of “Key Cyber Terrain” has gained popularity within the Cyberspace Operations community. The term is used as an…

Cyber Operational Architecture Training System – Cyber for All

Current methods for conducting cyber training are incompatible with the traditional, simulation-based training architectures used to conduct battlestaff training. As…

Enduring, Fleeting, Future: A brief overview of current sentiment and emotional analysis, a look forward

Introduction Sentiment and emotion analysis are critical tools in knowledge aggregation and interfacing with people. As we move from the…

A Collaboration Pipeline for Cybersecurity Research, Analytics, and Tools

Cybersecurity Data Gap Network and host-based sensors collect data that are foundational for current-day cybersecurity technologies such as intrusion detection…

Cybersecurity Competency Assessment Using Augmented Qualification Standards

Determining the capabilities of cybersecurity personnel is essential to support the Department of Defense (DoD) Cyber Strategy. The cyber ability…

Cyber-As-Zoo: Multidisciplinary Cyber Struggle

This quarter’s CSIAC Journal contains five articles that offer some perspectives to address the often-heard phrase “Cyber Is Hard”, usually…