Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
cyberworkforce

Cultivating Cybersecurity Talent Internally

As the number of unprecedented cyberthreats continues to rise, correspondingly the demand for cybersecurity professionals continues to surge in both…

robot-2301646_1280

Learning to Win: Making the Case for Autonomous Cyber Security Solutions

Machine learning is revolutionizing many industries and forever changing how we interact with computer systems and each other. The revolution…

Key Cyber Terrain CSIAC_Journal_V6N2_web

The Elusive Nature of “Key Cyber Terrain”

The concept of “Key Cyber Terrain” has gained popularity within the Cyberspace Operations community. The term is used as an…

COATS CSIAC_Journal_V6N2_web

Cyber Operational Architecture Training System – Cyber for All

Current methods for conducting cyber training are incompatible with the traditional, simulation-based training architectures used to conduct battlestaff training. As…

Enduring Fleeting Future CSIAC_Journal_V6N2_web

Enduring, Fleeting, Future: A brief overview of current sentiment and emotional analysis, a look forward

Introduction Sentiment and emotion analysis are critical tools in knowledge aggregation and interfacing with people. As we move from the…

A Collaboration Pipeline for Cybersecurity Research

A Collaboration Pipeline for Cybersecurity Research, Analytics, and Tools

Cybersecurity Data Gap Network and host-based sensors collect data that are foundational for current-day cybersecurity technologies such as intrusion detection…

CSIAC_Journal_V6N2_web

Cybersecurity Competency Assessment Using Augmented Qualification Standards

Determining the capabilities of cybersecurity personnel is essential to support the Department of Defense (DoD) Cyber Strategy. The cyber ability…

CSIAC_Journal_V6N2_web

Cyber-As-Zoo: Multidisciplinary Cyber Struggle

This quarter’s CSIAC Journal contains five articles that offer some perspectives to address the often-heard phrase “Cyber Is Hard”, usually…

artificial-intelligence-3382507_1920

Knowledge Temple of Decision Making

Knowledge Management (KM) is a discipline that is as much art as it is science.  Like the conversations that take…

CSIAC_Journal_V6N1_WEBVERSION

Detect, Contain and Control Cyberthreats

Today, every organization is a target and attackers can compromise any organization. Large-scale compromises used to be a surprise, but…

Offensive_Intrusion_Analysis-1024×677.png

Offensive Intrusion Analysis: Uncovering Insiders with Threat Hunting and Active Defense

Today’s adversaries are advanced and more capable than ever before. Passive defensive tactics are no longer viable for pursuing these…

embedded_devices-1024×436.png

Accessing the Inaccessible: Incident Investigation in a World of Embedded Devices

There are currently an estimated 4.9 billion embedded systems distributed worldwide. By 2020, that number is expected to have grown…