Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Software Protection Against Side Channel Analysis Through a Hardware Level Power Difference Eliminating Mask

Side Channel Analysis (SCA) is a method by which an adversary can gather information about cryptographic keys by examining the…

The Efficacy and Challenges of SCADA and Smart Grid Integration

The advent and evolution of the Smart Grid initiative to improve the electric utility power infrastructure has brought with it…

4G LTE Security for Mobile Network Operators

1. Abstract: Mobile network operators (MNOs) must grapple with complex security management in fourth generation Long Term Evolution (4G LTE)…

An Overview of the Schedule Compliance Risk Assessment Methodology (SCRAM)

Schedule slippage is an unfortunate reality for many large development programs. The Australian Defence Materiel Organisation Schedule Compliance Risk Assessment…

Metrinome – Continuous Monitoring and Security Validation of Distributed Systems

Distributed enterprise systems consist of a collection of interlinked services and components that exchange information to collectively implement functionality in…

Search…Backwards

Department of Defense (DoD) procurement references a large number of military-unique specifications, standards, and handbooks (standardization documents).  Project proposals and…

BEC: Applying Behavioral Economics to Harden Cyberspace

This article describes several cybersecurity innovations. First, it proposes to integrate behavioral economics’ findings of biases in judgment and decision-making…

BYOD Topic: How Complicated Can Calendars Be?

Using a representative example from something as simple as calendar synchronization, the unintended consequences of moving too quickly into the…

A Knowledge Management (KM) Primer

It can be difficult to navigate your way around the field of knowledge management (KM). Whether you are just starting…

Cyber Profiling: Using Instant Messaging Author Writeprints for Cybercrime Investigations

The explosive growth in the use of instant messaging (IM) communication in both personal and professional environments has resulted in…

BECO: Behavioral Economics of Cyberspace Operations

This paper proposes a risk-management framework Behavioral Economics of Cyberspace Operations (BECO) for hardening Cyberspace Operations (CO) with the Behavioral…

Toward Realistic Modeling Criteria of Games in Internet Security

There have been various attempts to apply game theory to various aspects of security situations. This paper is particularly interested…