Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Software Assurance Adoption through Open Source Tools

Software and Security engineering as a discipline is getting increased attention across the Department of Defense (DoD) as a mission…

Improving Software Assurance through Static Analysis Tool Expositions

The National Institute of Standards and Technology Software Assurance Metrics and Tool Evaluation team conducts research in static analysis tools…

SARD: Thousands of Reference Programs for Software Assurance

One way to understand the strengths and limitations of software assurance tools is to use a corpus of programs with…

Introduction to Tools & Testing Techniques for Assured Software – DoD Software Assurance Community of Practice: Volume 2

Greetings, it is my honor to introduce the second of two special software assurance (SwA) editions of the Journal of…

Cyber Risk to Transportation Industrial Control Systems

This paper is a result of a cyber risk assessment undertaken with the goal of increasing the cyber awareness of…

First Consolidated Basic Center Operations Contract to Quanterion

Quanterion Solutions is thrilled to be competitively selected to operate the Department of Defense (DoD) Cyber Security and Information Systems…

Air Force Research Laboratory’s In-Residence Professor Becomes Cybersecurity Preceptor in South Korea

The Air Force Research Laboratory (AFRL) is fortunate to have one of its subject matter experts (SMEs) working hand-in-hand with…

Shaping Preventive Policy in “Cyber War” and Cyber Security: A Pragmatic Approach

On January 28th, 2011, Egypt disappeared from the global map. In a coordinated shutdown of all major Egyptian internet service…

Securing Systems through Software Reliability Engineering

Once upon a time, a brave knight was entrusted with the guarding of a valuable treasure. An evil wizard had…

Signcryption for Biometric Security

Biometrics is the “something you are” identity factor used in authentication and identification systems. Organizations that rely on biometric technology…

Cyber Security and Digital Data Protection Concept

Cyber Security… the Virtual Frontier

Just a few short months ago on July 1st, 2012 the new Cyber Security and Information Systems Information Analysis Center…

Software productivity progress during the first decade of the 21st Century: Quantifying productivity

This paper summarizes the progress various industries have made in software productivity during the first decade of the 21st century….