Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Machine Learning and Network Intrusion Detection: Results from Grammatical Inference

Machine learning for network intrusion detection is an area of ongoing and active research (see references in [1] for a…

The Cyber Security Collaborative Research Alliance: Unifying Detection, Agility, and Risk in Mission-Oriented Cyber Decision Making

Abstract: For military networks and systems, the cyber domain is ever-increasingly contested and congested space. Defenders of these systems must…

Cyber Science and Technology at the Army Research Laboratory

The U.S. Army Research Laboratory (ARL) received the first salvos in the battle for cybersecurity as early as three decades…

Adjudication in Wargaming for Discovery

Introduction Wargaming is currently a very important topic, due to the renewed interest in pursuing the activity within the US…

Computer Assisted Military Wargaming: The SWIFT Wargame Tool

The Standard Wargame Integration Facilitation Toolkit (SWIFT), an Office of the Secretary of Defense, Cost Assessment and Program Evaluation (OSD…

Wargaming at the Naval Postgraduate School

Introduction The United States Department of Defense (DoD) and the military services have employed wargaming for well over a century…

Air Force Research Laboratory Innovation – Pushing the Envelope in Analytical Wargaming

Introduction The Air Force Research Laboratory has taken steps to revitalize wargaming across its Enterprise to evaluate the military utility…

Modeling and Simulation Support to Wargaming

If you deal in computer models and simulations (M&S), and you aim to support wargaming, you need to understand what…

The Need to Adopt a Business Systems Approach to Cloud Security

Joni Mitchell’s beautiful lament from forty-five years ago is timely today as an apt description of the unspoken truth of…

Automating Cloud Security Authorizations

This article describes the challenges and solutions for Security Authorization in a cloud based services environment. We describe Compliance as…

Cloud Computing

Cloud Nine, Are we there yet?

In 1961 at the MIT Centennial, John McCarthy opined “if computers of the kind I have advocated become the computers…

Cloud Computing – How Easy is it?

Most articles on cloud computing discuss security, policies, economies of scale, or other high level topics. For a more pragmatic…