Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
Publicly-Releasing-Open-Source-Article-Image

Publicly Releasing Open Source Software Developed for the U.S. Government

This article summarizes when the U.S. federal government or its contractors may publicly release, as open source software (OSS), software…

aron-visuals-bZZp1PmHI0E-unsplash

Application Specific Abstractions: A Research

The success of modern computing can be largely attributed to abstractions. By abstracting away the intricate details of how lower…

john-moeses-bauan-OGZtQF8iC0g-unsplash

Physics of Information Assurance

Information Assurance (IA) is the application of this directive in the cyber domain. IA activities include measures that protect and…

fly-d-qmJv4y-dGNc-unsplash

Networking Modeling and Simulation: Bridging the Gap from Theory to Field Tests

The use of live field testing for new data links, protocols, waveforms, radios, and algorithms is the traditional best-practice. With…

anton-maksimov-juvnsky-yUikXZrloQc-unsplash

Cyber Deception

The Department of Defense currently depends upon static cyber defense systems. Adversaries can plan their attacks carefully over time by…

kelvin-ang-QvU0LNnr26U-unsplash

Cross-domain Transfer: Information Support Server Environment (ISSE)

A. Cross-domain Transfer The proper treatment of classified data has always been important throughout this nation’s history. Classification of data…

1000w_q95

The Junior Force Council: Reaching Out to New Employees

Introduction and Council Mission At the Information Directorate, we have a unique group of individuals that serves to ensure that…

gr-stocks-Iq9SaJezkOE-unsplash

Bridging Fault Tolerance and Game Theory for Assuring Cyberspace

Two Air Force Office of Scientific Research (AFOSR)-funded in-house efforts have shaped the way that AFRL/RI has bridged fault tolerance…

robynne-hu-HOrhCnQsxnQ-unsplash

A Science of Network Configuration

Configuration is the glue for logically integrating network components to satisfy end-to-end requirements on security and functionality. Every component has…

hannah-joshua-46T6nVjRc2w-unsplash

Command and Control of Proactive Defense

Missions are under constant threat of cyber-attacks that can cause the denial of critical services and the loss of data…

shane-rounce-1ZZ96uESRJQ-unsplash

Case Study: Applying Agile Software Methods to Systems Engineering

Delivering a Software Intensive System (SIS) that is on time, within budget and with the required functionality with traditional systems…

sigmund-t-da_md1qMc-unsplash

Software Protection Against Side Channel Analysis Through a Hardware Level Power Difference Eliminating Mask

Side Channel Analysis (SCA) is a method by which an adversary can gather information about cryptographic keys by examining the…