Game Theoretic Modeling of Advanced Persistent Threat in Internet of Things
Cyber-Physical Systems (CPS) and Internet of Things (IoT) devices such as sensors, wearable devices, robots, drones, and autonomous vehicles facilitate…
CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.
Cyber-Physical Systems (CPS) and Internet of Things (IoT) devices such as sensors, wearable devices, robots, drones, and autonomous vehicles facilitate…
Software Defined Networking (SDN) and Network Function Virtualization (NFV) together promise to revolutionize the networking with unprecedented improvements in the…
NATO and nations use simulation environments for various purposes, such as training, capability development, mission rehearsal and decision support in…
The unique and intrinsic methods by which Linux application containers are created, deployed, networked, and operated do not lend themselves…
As the number of unprecedented cyberthreats continues to rise, correspondingly the demand for cybersecurity professionals continues to surge in both…
Machine learning is revolutionizing many industries and forever changing how we interact with computer systems and each other. The revolution…
The concept of “Key Cyber Terrain” has gained popularity within the Cyberspace Operations community. The term is used as an…
Current methods for conducting cyber training are incompatible with the traditional, simulation-based training architectures used to conduct battlestaff training. As…
Introduction Sentiment and emotion analysis are critical tools in knowledge aggregation and interfacing with people. As we move from the…
Cybersecurity Data Gap Network and host-based sensors collect data that are foundational for current-day cybersecurity technologies such as intrusion detection…
Determining the capabilities of cybersecurity personnel is essential to support the Department of Defense (DoD) Cyber Strategy. The cyber ability…
This quarter’s CSIAC Journal contains five articles that offer some perspectives to address the often-heard phrase “Cyber Is Hard”, usually…