Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

High-Fidelity Surgical Fasciotomy Simulator for Training Special Operations Medics

Fascia, a fibrous connective tissue, is responsible for allocating skeletal muscles and corresponding neurovasculature into function-based compartments. Pressure is capable…

Saving Female Lives using Simulation: Elevating the Training Experience

In order to effectively train Soldiers to feel comfortable providing medical care to females, and to react without hesitation in…

Capabilities of the Naval Medical Center Portsmouth Medical Simulation Center

A recent study (Makary & Daniel, 2016) of medical errors have estimated preventable medical errors may account for as many…

Navy Medical Modeling and Simulation in a DHA-Service World

This article reviews the background, scope, equipment, and organization of MM&S, placing particular emphasis on the evolving relationship between Readiness-oriented…

Providing Cyber Situational Awareness on Defense Platform Networks

Modern defense platforms are at increasing risk of cyber-attack from sophisticated adversaries. These platforms do not currently provide the situational…

Game Theoretic Modeling of Advanced Persistent Threat in Internet of Things

Cyber-Physical Systems (CPS) and Internet of Things (IoT) devices such as sensors, wearable devices, robots, drones, and autonomous vehicles facilitate…

Software Defined Networking for Army’s Tactical Network: Promises, Challenges, and an Architectural Approach

Software Defined Networking (SDN) and Network Function Virtualization (NFV) together promise to revolutionize the networking with unprecedented improvements in the…

A New Reality: Modelling & Simulation as a Service

NATO and nations use simulation environments for various purposes, such as training, capability development, mission rehearsal and decision support in…

Container Intrusions: Assessing the Efficacy of Intrusion Detection and Analysis Methods for Linux Container Environments

The unique and intrinsic methods by which Linux application containers are created, deployed, networked, and operated do not lend themselves…

Cultivating Cybersecurity Talent Internally

As the number of unprecedented cyberthreats continues to rise, correspondingly the demand for cybersecurity professionals continues to surge in both…

Learning to Win: Making the Case for Autonomous Cyber Security Solutions

Machine learning is revolutionizing many industries and forever changing how we interact with computer systems and each other. The revolution…

The Elusive Nature of “Key Cyber Terrain”

The concept of “Key Cyber Terrain” has gained popularity within the Cyberspace Operations community. The term is used as an…