Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
Winning paper for the 11th annual Best Scientific Cybersecurity Paper Competition Graphic

NSA Awards Authors of Study of Automated Attacks on New Webservers

The National Security Agency (NSA) Research Directorate recently selected “Uninvited Guests:  Analyzing the Identity and Behavior of Certificate Transparency Bots,” as…

JFHQ DODIN

JFHQ-DODIN Officially Launches its New Cyber Operational Readiness Assessment Program

Following a successful nine-month pilot, Joint Force Headquarters — Department of Defense Information Network (JFHQ-DODIN) is officially launching its Cyber…

cyber graphic showing an open lock; photo source: Canva, GraphicsFuel

The Post-Quantum Cryptography

Safe digital communication for organizations and individuals is protected online by using cryptography, whether making an online purchase from a favorite online store or sending an email to a friend or colleague. Imagine the impact if cybercriminals could break the cryptographic algorithms used to encrypt all our banking, medical information and history, or any sensitive data we use in our day-to-day digital life.

graphic of computer monitor with images of soldiers and helicopters on it; photo source: Canva

Modeling & Simulation: Battle Readiness in a Virtual World

As the world becomes more complex, the U.S. Department of Defense (DoD) faces a range of challenges that demands innovative solutions. One tool that has proven invaluable in this regard is modeling and simulation (M&S)—the process of creating a representation of a system or process and then using that representation to explore and test different scenarios.

graphic showing an iceberg with people and aircraft above the water line (photo source: Canva)

Dark Net Usage for Countries in Conflict

For many, the “dark web” harbors a stigma. After the rise of notorious “dark net markets” like “Silk Road” and “AlphaBay” in the early 2010s, pop culture has come to equate the “dark web” with illegality and contraband.

person wearing helmet with cyber graphics and icons over the left eye of the helmet (Photo Source: Digital Art Rendering From 123rf.com and U.S. Air Force)

Improving the U.S. Air Force’s Cyber Defense Strategy

April 2007 marks the month when the internet became weaponized [1]. In Estonia’s capital city of Tallinn, the government decided to move a bronze statue of a Russian soldier from the city center to a war memorial cemetery on the outskirts of town (Figure 1). They wanted to move the statue during the 60th anniversary of its erection in 1947, which memorialized the sacrifices of Russian soldiers liberating eastern Europe from the Nazis.

red warning button; photo source: 123RF.com

A Defense-In-Depth and Layered Approach to Software Supply Chain Security

In this article, we will discuss the confluence and utility of using software supply chain (SSC)-focused frameworks (The Updated Framework [TUF] and the in-toto framework), combined with behavioral approaches using artificial intelligence (AI) aligned with the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), to generate a truly comprehensive approach for SSC security [1]. Such a “defense-in-depth” approach recognizes that these frameworks by themselves fall short of addressing the guidelines for the integrity of SSCs.

Graph Nueral Networks

Researchers at ORNL Demonstrate Scalability of GNNs on World’s Most Powerful Computing Systems

Solving today’s most complex scientific challenges often means tracing links between hundreds, thousands, or even millions of variables. The larger…

A graphic shows the watch floor of Navy Fleet Cyber Command.

US Can Respond Decisively to Cyber Threat Posed by China

The cyber challenge posed by China is unlike any challenge ever faced by the US and its allies, said the…

Students from UCSD visit March ARB to help incorporate Artificial Intelligence into MQ-9 Platform

Battle Looming Between AI and Counter-AI, Says Official

The Defense Department is just at the start of using artificial intelligence. “Peer competitors are as well,” said Jude R….

Transport Layer Security 1.3

New NCCoE Guide Helps Major Industries Observe Incoming Data While Using Latest Internet Security Protocol

Companies in major industries such as finance and health care must follow best practices for monitoring incoming data for cyberattacks….

CISA NSA China CI

U.S. and International Partners Publish Cybersecurity Advisory on People’s Republic of China State-Sponsored Hacking of U.S. Critical Infrastructure

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Federal Bureau of Investigation (FBI), along…