Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Shaping Preventive Policy in “Cyber War” and Cyber Security: A Pragmatic Approach

On January 28th, 2011, Egypt disappeared from the global map. In a coordinated shutdown of all major Egyptian internet service…

Securing Systems through Software Reliability Engineering

Once upon a time, a brave knight was entrusted with the guarding of a valuable treasure. An evil wizard had…

Signcryption for Biometric Security

Biometrics is the “something you are” identity factor used in authentication and identification systems. Organizations that rely on biometric technology…

Cyber Security and Digital Data Protection Concept

Cyber Security… the Virtual Frontier

Just a few short months ago on July 1st, 2012 the new Cyber Security and Information Systems Information Analysis Center…

Software productivity progress during the first decade of the 21st Century: Quantifying productivity

This paper summarizes the progress various industries have made in software productivity during the first decade of the 21st century….

Advances in the Acquisition of Secure Systems Based on Open Architectures

The role of software acquisition ecosystems in the development and evolution of secure open architecture systems has received insufficient consideration….

Development and Transition of the SEI Software Assurance Curriculum

In this article, we discuss the development and transition of the Software Engineering Institute’s (SEI’s) Software Assurance Curriculum. The Master…

Defense Technical Information Center’s (DTIC’s) Hidden Gems

The Defense Technical Information Center (DTIC) provides a host of products and services to the DoD and to users in…

Is Our Software REALLY Secure?

The answer to the question is NO – as noted in the DoD Director, Operational Test and Evaluation FY 2016…

Hacker 101 & Secure Coding: A Grassroots Movement towards Software Assurance

The frequency and complexity of attacks upon the software assets of the United States Military is increasing at a rate…

Software Assurance in The Agile Software Development Lifecycle

Over the last 30 years, the DoD has struggled to adapt to the ever-changing world of software development. Of these…

Keys to Successful DoD Software Project Execution

Software is inherent in today’s complex systems and is often the primary cost, schedule, and technical performance driver in Department…