Information Security Continuous Monitoring (ISCM)
The ability for commanders to know and understand an organizational attack surface, its vulnerabilities, and associated risks is a fundamental…
CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.
The ability for commanders to know and understand an organizational attack surface, its vulnerabilities, and associated risks is a fundamental…
Cyber Physical Systems (CPSs) are electronic control systems that control physical machines such as motors and valves in an industrial…
Abstract Modern day detection of cyber threats is a highly manual process where teams of human analysts flag suspicious events…
Machine learning for network intrusion detection is an area of ongoing and active research (see references in [1] for a…
Abstract: For military networks and systems, the cyber domain is ever-increasingly contested and congested space. Defenders of these systems must…
The U.S. Army Research Laboratory (ARL) received the first salvos in the battle for cybersecurity as early as three decades…
Introduction Wargaming is currently a very important topic, due to the renewed interest in pursuing the activity within the US…
The Standard Wargame Integration Facilitation Toolkit (SWIFT), an Office of the Secretary of Defense, Cost Assessment and Program Evaluation (OSD…
Introduction The United States Department of Defense (DoD) and the military services have employed wargaming for well over a century…
Introduction The Air Force Research Laboratory has taken steps to revitalize wargaming across its Enterprise to evaluate the military utility…
If you deal in computer models and simulations (M&S), and you aim to support wargaming, you need to understand what…
Joni Mitchell’s beautiful lament from forty-five years ago is timely today as an apt description of the unspoken truth of…