Rebooting Letters of Marque for Private Sector, Active Cyber Defense
The views expressed in this paper are those of the author and do not reflect the official policy or position…
CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.
The views expressed in this paper are those of the author and do not reflect the official policy or position…
Categorization of all information technology threats can improve communication of risk for an organization’s decision-makers who must determine the investment…
Sophisticated adversaries are moving their botnet command and control infrastructure to social media microblogging sites such as Twitter. As security…
This article describes how mission scenarios created using gaming software can be used as a graphical concept of operations (CONOPS)…
The Joint Training Enterprise (JTE) requires effective integration of and technical interoperability among disparate synthetic training capabilities from across the…
Following the DoD’s Digital Engineering (DE) strategy NAVAIR’s Systems Engineering Transformation (SET) Framework investigates the modeling, feasibility and collaboration with…
Hybrid network emulation (HNE) [9], [10], [11] is comprised of a discrete-event simulated links/networks and virtual machines (VMs)/containers that send…
A Case Study of Innovation through the Implementation of a Common Architecture and the Creation of a Collaborative Development Environment…
The idea behind AFSIM is a common modeling framework, using common models in a common environment with a common threat…
Welcome to the annual CSIAC edition on Modeling and Simulation. This year’s theme is ‘Innovation’ – a term that often…
The Internet of Things The Internet of Things (IOT) is based upon the integration of commercial TCP-IP networks with ubiquitous,…
Today’s cyber defenders find themselves at a disadvantage despite technological advances in cyber defense. Among the chief causes of this…