Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Threats to Mobile Security

In the past five years alone, the amount of mobile data has grown eighteenfold (Cisco Mobile VNI, 2017). Security concerns…

Cloud Infrastructure Deployment

An increasing number of organizations are moving their existing infrastructure to the cloud because of the benefits it affords them….

Early Synthetic Prototyping Digital Warfighting For Systems Engineering

It is widely accepted that many state and non-state adversaries are approaching technical parity with United States military. This is…

Crowd-Driven Tactical Decision Game: Training Tactical Creativity

In this article we describe how we used the concepts of serious gaming and crowd-sourcing to design, develop and play-test…

Serious Gaming Design for Adaptability Training of Military Personnel

As the world in the 21st century has become more dynamic and unpredictable, the need for adaptive behavior in the…

Learning Cyber Operations Through Gaming: An overview of current and up and coming gamified learning environments

Cyber warfare, cyberterrorism, and cybercrime are serious existential threats to the national security of the United States. This is driving…

Introduction to Serious Games to Enhance Defense Capabilities – Modeling & Simulation Special Edition

It is our honor to introduce the Modeling and Simulation (M&S) “Serious Games to Enhance Defense Capabilities” Special Edition of…

Piloting Software Assurance Tools in the Department of Defense

In this article, we present and describe the JFAC Enterprise Software Licensing Pilot program activities during the 2016 fiscal year….

The Software Assurance State-of-the-Art Resource

Unintentional and intentionally inserted vulnerabilities in software can provide adversaries with various avenues to reduce system effectiveness, render systems useless,…

Engineering Software Assurance into Weapons Systems During the DoD Acquisition Life Cycle

Software assurance (SwA) is the “level of confidence that software functions as intended and is free of vulnerabilities, either intentionally…

Software Assurance Measurement – Establishing a Confidence that Security is Sufficient

Measuring the software assurance of a product as it functions within a specific system context involves assembling carefully chosen metrics…

Software Assurance Adoption through Open Source Tools

Software and Security engineering as a discipline is getting increased attention across the Department of Defense (DoD) as a mission…