Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Metrinome – Continuous Monitoring and Security Validation of Distributed Systems

Distributed enterprise systems consist of a collection of interlinked services and components that exchange information to collectively implement functionality in…

Search…Backwards

Department of Defense (DoD) procurement references a large number of military-unique specifications, standards, and handbooks (standardization documents).  Project proposals and…

BEC: Applying Behavioral Economics to Harden Cyberspace

This article describes several cybersecurity innovations. First, it proposes to integrate behavioral economics’ findings of biases in judgment and decision-making…

BYOD Topic: How Complicated Can Calendars Be?

Using a representative example from something as simple as calendar synchronization, the unintended consequences of moving too quickly into the…

A Knowledge Management (KM) Primer

It can be difficult to navigate your way around the field of knowledge management (KM). Whether you are just starting…

How Does an Analyst Select M&S to Support the Entire DoD Acquisition Lifecycle Process?

Modeling and Simulation (M&S) users who require complex M&S typically do not have a long lifecycle for an experiment, analysis…

Sensor Life Cycle Acquisition and Training with Modeling & Simulation

The U.S. Army’s Night Vision and Electronic Sensors Directorate (NVESD) Modeling and Simulation Division (MSD) provides sensors acquisition engineering and…

A Probability of 1

If you protect a luscious, valuable, amazingly tempting data object, the probability of its being stolen is 1. It’s as…

Achieving Information Dominance: Unleashing the Ozone Widget Framework

“The continued development and proliferation of information technologies will substantially change the conduct of military operations. These changes in the…

Increasing Assurance Levels Through Early Verification with Type Safety – Unabridged Version

Today defense, intelligence and civilian agencies are focused on cyber security challenges. Early results seem conflicting. While media reports are…

Managing Operational Resilience

A search at your favorite news aggregator for keywords such as “malware,” “computer virus,” or “data breach” will return results…

Looking at M&S Education Through the Prism of the Video Game Industry

Let’s discuss what DOD Modeling & Simulation (M&S) can learn about education from the commercial gaming world. There are occasions…