Accessing the Inaccessible: Incident Investigation in a World of Embedded Devices
There are currently an estimated 4.9 billion embedded systems distributed worldwide. By 2020, that number is expected to have grown…
CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.
There are currently an estimated 4.9 billion embedded systems distributed worldwide. By 2020, that number is expected to have grown…
The Payment Card Industry published the Data Security Standard 11 years ago; however, criminals are still breaching companies and getting…
Researchers at Carnegie-Mellon University have created an “Insider Threat Ontology” as a framework for knowledge representation and sharing of malicious…
Building a quarterly journal that spans broad topical and technical themes can be challenging, and the selection of articles for…
In the past five years alone, the amount of mobile data has grown eighteenfold (Cisco Mobile VNI, 2017). Security concerns…
An increasing number of organizations are moving their existing infrastructure to the cloud because of the benefits it affords them….
It is widely accepted that many state and non-state adversaries are approaching technical parity with United States military. This is…
In this article we describe how we used the concepts of serious gaming and crowd-sourcing to design, develop and play-test…
As the world in the 21st century has become more dynamic and unpredictable, the need for adaptive behavior in the…
Cyber warfare, cyberterrorism, and cybercrime are serious existential threats to the national security of the United States. This is driving…
It is our honor to introduce the Modeling and Simulation (M&S) “Serious Games to Enhance Defense Capabilities” Special Edition of…
In this article, we present and describe the JFAC Enterprise Software Licensing Pilot program activities during the 2016 fiscal year….