Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Reconfigurable Signal-Injection Missile Simulation (RSIMS)

A Case Study of Innovation through the Implementation of a Common Architecture and the Creation of a Collaborative Development Environment…

AFSIM: The Air Force Research Laboratory’s Approach to Making M&S Ubiquitous in the Weapon System Concept Development Process

The idea behind AFSIM is a common modeling framework, using common models in a common environment with a common threat…

M&S Applied Across Broad Spectrum Defense and Federal Endeavors

Welcome to the annual CSIAC edition on Modeling and Simulation. This year’s theme is ‘Innovation’ – a term that often…

The Internet of Things and the “Next War”

The Internet of Things The Internet of Things (IOT) is based upon the integration of commercial TCP-IP networks with ubiquitous,…

Addressing Both Sides of the Cybersecurity Equation

Today’s cyber defenders find themselves at a disadvantage despite technological advances in cyber defense. Among the chief causes of this…

Resilient Industrial Control Systems (ICS) & Cyber Physical Systems (CPS)

Cyber-physical system attacks have crept from the theory to reality; 2017-2018 demonstrated the severity of the threat to Critical Infrastructure,…

Practical Industrial Control System (ICS) Cybersecurity: IT and OT Have Converged – Discover and Defend Your Assets

More than half of respondents to a recent Industrial (Internet of Things) IoT security survey use connected devices in Industrial…

Applying Cyber Threat Intelligence to Industrial Control Systems

THE PURPOSE OF CYBER THREAT INTELLIGENCE (CTI) IS TO HELP PROTECT NETWORK INFRASTRUCTURES. Threat intelligence platforms (TIPs) have been created…

Gaining Endpoint Log Visibility in ICS Environments

Security event logging is a base IT security practice and is referenced in Industrial Control Security (ICS) standards and best…

Data Manipulation: Attacks and Mitigation

Confidentiality, Integrity, and Availability In terms of cybersecurity, the Confidentiality, Integrity, and Availability, also known as the CIA Triad, is…

Artificial Intelligence: The Next “Nuclear Arms Race” – “Space Race to the Edge”

Figuring out where and how Artificial Intelligence (AI) and its various sub-types (Machine Learning, Deep Learning, etc.) fit into our…

Staying Ahead of the Race – Quantum Computing and Cybersecurity

Cryptography is an integral part of a cybersecurity professional’s toolkit. It is used for Confidentiality, Integrity, Non-repudiation and more. Cryptosystems…