Keys to Successful DoD Software Project Execution
Software is inherent in today’s complex systems and is often the primary cost, schedule, and technical performance driver in Department…
CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.
Software is inherent in today’s complex systems and is often the primary cost, schedule, and technical performance driver in Department…
The use of manual methods to monitor system controls has essentially become impractical due to the growing number of applicable…
Analyzing risk is critical throughout the software acquisition lifecycle. System risk is assessed by conducting a penetration test, where ethical…
The ability for commanders to know and understand an organizational attack surface, its vulnerabilities, and associated risks is a fundamental…
Cyber Physical Systems (CPSs) are electronic control systems that control physical machines such as motors and valves in an industrial…
Abstract Modern day detection of cyber threats is a highly manual process where teams of human analysts flag suspicious events…
Machine learning for network intrusion detection is an area of ongoing and active research (see references in [1] for a…
Abstract: For military networks and systems, the cyber domain is ever-increasingly contested and congested space. Defenders of these systems must…
The U.S. Army Research Laboratory (ARL) received the first salvos in the battle for cybersecurity as early as three decades…
Introduction Wargaming is currently a very important topic, due to the renewed interest in pursuing the activity within the US…
The Standard Wargame Integration Facilitation Toolkit (SWIFT), an Office of the Secretary of Defense, Cost Assessment and Program Evaluation (OSD…
Introduction The United States Department of Defense (DoD) and the military services have employed wargaming for well over a century…