Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Detect, Contain and Control Cyberthreats

Today, every organization is a target and attackers can compromise any organization. Large-scale compromises used to be a surprise, but…

Offensive Intrusion Analysis: Uncovering Insiders with Threat Hunting and Active Defense

Today’s adversaries are advanced and more capable than ever before. Passive defensive tactics are no longer viable for pursuing these…

Accessing the Inaccessible: Incident Investigation in a World of Embedded Devices

There are currently an estimated 4.9 billion embedded systems distributed worldwide. By 2020, that number is expected to have grown…

Compliant but not Secure: Why PCI-Certified Companies Are Being Breached

The Payment Card Industry published the Data Security Standard 11 years ago; however, criminals are still breaching companies and getting…

Extensions to Carnegie-Mellon University’s Malicious Insider Ontology to Model Human Error

Researchers at Carnegie-Mellon University have created an “Insider Threat Ontology” as a framework for knowledge representation and sharing of malicious…

Introduction: Insider Threat and the Malicious Insider Threat – Analyze. Deter. Discover. Prevent. Respond

Building a quarterly journal that spans broad topical and technical themes can be challenging, and the selection of articles for…

Threats to Mobile Security

In the past five years alone, the amount of mobile data has grown eighteenfold (Cisco Mobile VNI, 2017). Security concerns…

Cloud Infrastructure Deployment

An increasing number of organizations are moving their existing infrastructure to the cloud because of the benefits it affords them….

Early Synthetic Prototyping Digital Warfighting For Systems Engineering

It is widely accepted that many state and non-state adversaries are approaching technical parity with United States military. This is…

Crowd-Driven Tactical Decision Game: Training Tactical Creativity

In this article we describe how we used the concepts of serious gaming and crowd-sourcing to design, develop and play-test…

Serious Gaming Design for Adaptability Training of Military Personnel

As the world in the 21st century has become more dynamic and unpredictable, the need for adaptive behavior in the…

Learning Cyber Operations Through Gaming: An overview of current and up and coming gamified learning environments

Cyber warfare, cyberterrorism, and cybercrime are serious existential threats to the national security of the United States. This is driving…