Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Hanscom AFB Team Supports ‘Revolutionary’ Zero Trust Effort

HANSCOM AIR FORCE BASE, Mass. (AFNS) — Personnel from the AFNet Sustainment and Operations Branch at Hanscom Air Force Base are partnering…

Defense Official Testifies About DOD Information Technology, Cybersecurity Efforts

John Sherman told the House Armed Services Committee’s panel on cyber, innovative technologies and information systems that cloud computing is…

DOD Demonstrates Mobile Microgrid Technology

The Office of the Undersecretary of Defense for Research and Engineering and the Department of the Army recently demonstrated a…

NSA, Cybercom Leader Says Efforts Have Expanded

Adversaries have heavily invested in cyberspace operations and capabilities. As such, cyber operations, cybersecurity and information operations are increasingly important…

Canadian Navy Team Wins DOD’s Annual Cyber Defense Exercise

A team from the Royal Canadian Navy came out on top in the Defense Department’s annual Cyber Flag 21-2 training…

Nellis AFB empowers warfighters via DevSecOps

-ELLIS AIR FORCE BASE, Nev. (AFNS) — The Department of the Air Force Rapid Capabilities Office is using multiple technologies to build…

Hypergaming for Cyber – Strategy for Gaming a Wicked Problem

Hypergaming analysis as a tool for examining conflicts, situations, and constructs has been used liberally throughout numerous environments for decades….

Can the “Gorilla” Deliver? Assessing the Security of Google’s New “Thread” Internet of Things (IoT) Protocol

Security incidents associated with Internet of Things (IoT) devices have recently gained high visibility, such as the Mirai botnet that…

Rebooting Letters of Marque for Private Sector Active Cyber Defense

The views expressed in this paper are those of the author and do not reflect the official policy or position…

Evaluation of Comprehensive Taxonomies for Information Technology Threats

Categorization of all information technology threats can improve communication of risk for an organization’s decision-makers who must determine the investment…

Times Change and Your Training Data Should Too: The Effect of Training Data Recency on Twitter Classifiers

Sophisticated adversaries are moving their botnet command and control infrastructure to social media microblogging sites such as Twitter. As security…

Optimizing for Mission Success Using a Stochastic Gaming Simulation

This article describes how mission scenarios created using gaming software can be used as a graphical concept of operations (CONOPS)…