Machine Learning and Network Intrusion Detection: Results from Grammatical Inference
Machine learning for network intrusion detection is an area of ongoing and active research (see references in [1] for a…
CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.
Machine learning for network intrusion detection is an area of ongoing and active research (see references in [1] for a…
Abstract: For military networks and systems, the cyber domain is ever-increasingly contested and congested space. Defenders of these systems must…
The U.S. Army Research Laboratory (ARL) received the first salvos in the battle for cybersecurity as early as three decades…
Introduction Wargaming is currently a very important topic, due to the renewed interest in pursuing the activity within the US…
The Standard Wargame Integration Facilitation Toolkit (SWIFT), an Office of the Secretary of Defense, Cost Assessment and Program Evaluation (OSD…
Introduction The United States Department of Defense (DoD) and the military services have employed wargaming for well over a century…
Introduction The Air Force Research Laboratory has taken steps to revitalize wargaming across its Enterprise to evaluate the military utility…
If you deal in computer models and simulations (M&S), and you aim to support wargaming, you need to understand what…
Joni Mitchell’s beautiful lament from forty-five years ago is timely today as an apt description of the unspoken truth of…
This article describes the challenges and solutions for Security Authorization in a cloud based services environment. We describe Compliance as…
In 1961 at the MIT Centennial, John McCarthy opined “if computers of the kind I have advocated become the computers…
Most articles on cloud computing discuss security, policies, economies of scale, or other high level topics. For a more pragmatic…