State-of-the-Art Reports (SOARs)

SOARs are CSIAC publications that provide in-depth analysis of current technologies, research, and the latest technical information available on a topic within any of the CSIAC technical focus areas.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

AI SSC

Applications of Artificial Intelligence (AI) for Protecting Software Supply Chains (SSCs) in the Defense Industrial Base (DIB)

The application of artificial intelligence (AI) to software supply chains (SSCs) within the defense industrial base (DIB) holds promise to improve cybersecurity posture, ensure stricter compliance with National Institute of Standards and Technology (NIST) controls,…

Blockchain Applications for Federal Government

Blockchain is an emerging technology with a growing number of applications across many industries. Understanding how blockchain technology can be implemented and utilized successfully requires understanding the fundamentals of the technology, its applications, its limitations,…

Edge Computing and Communications Over Untrusted Transport

Today’s “gray zone” battlefield has become increasingly digital.  The fielding of “edge” sensors, processing tools, and ubiquitous transport—coupled with global cloud infrastructures—is transforming data collection, exploitation, and sharing, driving rapid decision-making at the speed of…

Commodity Deep Learning Technologies Supporting Autonomy on Small, Inexpensive Platforms

This report reviews state-of-the-art artificial intelligence/machine learning (AI/ML) hardware and software technologies supporting autonomy on small, inexpensive platforms. It focuses on commodity hardware components and widely available software ecosystems for deep learning, the subset of…

Digital Transformation of Satellite Communication Networks

Driven by the rapidly changing space segment, satellite ground networks are in the midst of evolutionary change called the digital transformation. This transformation will enable the satellite communications (SATCOM) to realize benefits in speed of…

Functional Cyber Security Technology Infrastructure

The rapid growth of system of interrelated, internet-connected objects, and global dependence on the internet has significantly increased the cyber-attack surface of information technology (IT) infrastructure, thereby increasing cyber-attack vectors to those highly motivated hackers….

Cloud Computing for the Government Sector

Department of Defense (DoD) organizations often process sensitive data that cannot be entrusted to 3rd party organizations without precautions and protections. The Defense Information Systems Agency (DISA) is in the process of defining these protections…

Cloud Computing in the Government

Cloud computing is currently one of the biggest trends in the information technology (IT) industry. Over the past several years, cloud computing has gained significant momentum to be the cost effective and efficient alternative to…

Use of Mobile Technology for Information Collection & Dissemination

Mobile technology is increasingly being utilized as a tool for information dissemination and collection. Numerous agencies, including the U.S. Department of Defense (DoD), Department of Homeland Security (DHS), the intelligence community, and law enforcement are…

Security Risk Management for the Off-the-Shelf (OTS) Information and Communications Technology (ICT) Supply Chain

This SOAR provides a comprehensive examination of the current state-of-the-art in addressing supply chain risk management (SCRM) as it pertains to ICT. This includes how ICT SCRM emerged as a major concern in DOD, the…

Measuring Cyber Security and Information Assurance

The rapid growth of connections, processing, bandwidth, users, and global dependence on the Internet has greatly increased vulnerabilities of information technology (IT) infrastructure to increasingly sophisticated and motivated attacks. Despite significantly increased funding for research,…

The Insider Threat to Information Systems

The insider threat provides a comprehensive examination of the current state-of-the-art in addressing it as it pertains to information technology systems. This SOAR provides an overview of how the insider threat is defined and viewed…