Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
ai-4846063_1920

Hypergaming for Cyber – Strategy for Gaming a Wicked Problem

Hypergaming analysis as a tool for examining conflicts, situations, and constructs has been used liberally throughout numerous environments for decades….

CSIAC_Journal_V7N4_hv5

Can the “Gorilla” Deliver? Assessing the Security of Google’s New “Thread” Internet of Things (IoT) Protocol

Security incidents associated with Internet of Things (IoT) devices have recently gained high visibility, such as the Mirai botnet that…

rebooting letters of marque

Rebooting Letters of Marque for Private Sector, Active Cyber Defense

The views expressed in this paper are those of the author and do not reflect the official policy or position…

CSIAC_Journal_V7N4_hv5

Evaluation of Comprehensive Taxonomies for Information Technology Threats

Categorization of all information technology threats can improve communication of risk for an organization’s decision-makers who must determine the investment…

Times Change Image CSIAC_Journal_V7N4_hv5_WEB

Times Change and Your Training Data Should Too: The Effect of Training Data Recency on Twitter Classifiers

Sophisticated adversaries are moving their botnet command and control infrastructure to social media microblogging sites such as Twitter. As security…

Gaming Simulation Image CSIAC_Journal_V7N3_WEB

Optimizing for Mission Success Using a Stochastic Gaming Simulation

This article describes how mission scenarios created using gaming software can be used as a graphical concept of operations (CONOPS)…

Synthetic Training Image CSIAC_Journal_V7N3_WEB

Enabling Joint Synthetic Training Interoperability Through Joint Federated Common Data Services

The Joint Training Enterprise (JTE) requires effective integration of and technical interoperability among disparate synthetic training capabilities from across the…

Digital Signoff Image CSIAC_Journal_V7N3_WEB

View and Viewpoint Based Digital Signoff Using OpenMBEE as an Authoritative Source of Truth

Following the DoD’s Digital Engineering (DE) strategy NAVAIR’s Systems Engineering Transformation (SET) Framework investigates the modeling, feasibility and collaboration with…

Hybrid Network Emulation Image CSIAC_Journal_V7N3_WEB

Hybrid Network Emulation with Cyber and Electronic Warfare Effects

Hybrid network emulation (HNE) [9], [10], [11] is comprised of a discrete-event simulated links/networks and virtual machines (VMs)/containers that send…

Injection Missile Simulation Image CSIAC_Journal_V7N3_WEB

Reconfigurable Signal-Injection Missile Simulation (RSIMS)

A Case Study of Innovation through the Implementation of a Common Architecture and the Creation of a Collaborative Development Environment…

AFSIM Image CSIAC_Journal_V7N3_WEB

AFSIM: The Air Force Research Laboratory’s Approach to Making M&S Ubiquitous in the Weapon System Concept Development Process

The idea behind AFSIM is a common modeling framework, using common models in a common environment with a common threat…

MS Broad Spectrum Defense Image CSIAC_Journal_V7N3_WEB

M&S Applied Across Broad Spectrum Defense and Federal Endeavors

Welcome to the annual CSIAC edition on Modeling and Simulation. This year’s theme is ‘Innovation’ – a term that often…