Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Container Intrusions: Assessing the Efficacy of Intrusion Detection and Analysis Methods for Linux Container Environments

The unique and intrinsic methods by which Linux application containers are created, deployed, networked, and operated do not lend themselves…

Cultivating Cybersecurity Talent Internally

As the number of unprecedented cyberthreats continues to rise, correspondingly the demand for cybersecurity professionals continues to surge in both…

Learning to Win: Making the Case for Autonomous Cyber Security Solutions

Machine learning is revolutionizing many industries and forever changing how we interact with computer systems and each other. The revolution…

The Elusive Nature of “Key Cyber Terrain”

The concept of “Key Cyber Terrain” has gained popularity within the Cyberspace Operations community. The term is used as an…

Cyber Operational Architecture Training System – Cyber for All

Current methods for conducting cyber training are incompatible with the traditional, simulation-based training architectures used to conduct battlestaff training. As…

Enduring, Fleeting, Future: A brief overview of current sentiment and emotional analysis, a look forward

Introduction Sentiment and emotion analysis are critical tools in knowledge aggregation and interfacing with people. As we move from the…

A Collaboration Pipeline for Cybersecurity Research, Analytics, and Tools

Cybersecurity Data Gap Network and host-based sensors collect data that are foundational for current-day cybersecurity technologies such as intrusion detection…

Cybersecurity Competency Assessment Using Augmented Qualification Standards

Determining the capabilities of cybersecurity personnel is essential to support the Department of Defense (DoD) Cyber Strategy. The cyber ability…

Cyber-As-Zoo: Multidisciplinary Cyber Struggle

This quarter’s CSIAC Journal contains five articles that offer some perspectives to address the often-heard phrase “Cyber Is Hard”, usually…

Knowledge Temple of Decision Making

Knowledge Management (KM) is a discipline that is as much art as it is science.  Like the conversations that take…

Detect, Contain and Control Cyberthreats

Today, every organization is a target and attackers can compromise any organization. Large-scale compromises used to be a surprise, but…

Offensive Intrusion Analysis: Uncovering Insiders with Threat Hunting and Active Defense

Today’s adversaries are advanced and more capable than ever before. Passive defensive tactics are no longer viable for pursuing these…