Evaluating Open Source Software
There is an overwhelming amount of open source software (OSS) available today that can be used throughout the software development…
On 10/29/2024, we will be making updates to our IT systems which will restrict your access to our member portal. For more information about the changes, please visit this page. Should you experience any issues or have any questions, you can reach us at contact@csiac.org.
CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.
There is an overwhelming amount of open source software (OSS) available today that can be used throughout the software development…
“The United States cannot retreat behind a Maginot Line of firewalls or it will risk being overrun. Cyberwarfare is like…
Nearly all publicly-available open source software (OSS) is commercial software. Unfortunately, many government officials and contractors fail to understand this. …
This article summarizes when the U.S. federal government or its contractors may publicly release, as open source software (OSS), software…
The success of modern computing can be largely attributed to abstractions. By abstracting away the intricate details of how lower…
Information Assurance (IA) is the application of this directive in the cyber domain. IA activities include measures that protect and…
The use of live field testing for new data links, protocols, waveforms, radios, and algorithms is the traditional best-practice. With…
The Department of Defense currently depends upon static cyber defense systems. Adversaries can plan their attacks carefully over time by…
A. Cross-domain Transfer The proper treatment of classified data has always been important throughout this nation’s history. Classification of data…
Introduction and Council Mission At the Information Directorate, we have a unique group of individuals that serves to ensure that…
Two Air Force Office of Scientific Research (AFOSR)-funded in-house efforts have shaped the way that AFRL/RI has bridged fault tolerance…
Configuration is the glue for logically integrating network components to satisfy end-to-end requirements on security and functionality. Every component has…