Cyber Community of Interest (COI)
Community

Cyber Community of Interest (COI)

The Cyber COI provides a forum for coordinating cyber S&T strategies, sharing new ideas, technical directions and technology opportunities, and jointly planning programs across the Department.

The Department of Defense Cyber Strategy
Best Practice/Reference Document

The Department of Defense Cyber Strategy

The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three ...

Free Publications Now Available at the CSIAC Store!
Product

Free Publications Now Available at the CSIAC Store!

Visit the CSIAC store to view all the products available including FREE publications!

  1. Newest Content
  2. Popular Today
  3. Recent Discussion
  4. Most Commented
  • CSIAC Admin
    SWMR Has Been Discontinued - 30 views(s) today
    04/20/2015 - 12:45pm by CSIAC Admin
    As of April 20th 2015 the SoftWare Model Repository (SWMR) has been discontinued.If you have any questions, please send an email to info@csiac.org.
  • CSIAC Admin
    09/02/2014 - 4:23pm by CSIAC Admin
    There have been various attempts to apply game theory to various aspects of security situations. This paper is particularly interested in security as relates to computers and the Internet. While...
  • CSIAC Admin
    SDTATIC Has Been Discontinued - 19 views(s) today
    06/30/2014 - 10:52am by CSIAC Admin
    The Software Development Tools and Technology Information Clearinghouse (SDTATIC) has been discontinued.  CSIAC appreciates the support of the vendors who provided product information for...
  • CSIAC Admin
    08/03/2015 - 1:16pm by CSIAC Admin
    Understanding the software development process and gathering data and metrics on the process is an important step to making better-informed cost and effort estimates, improving processes, and...
  • CSIAC Admin
    10/25/2013 - 10:19am by CSIAC Admin
    1. Abstract: Mobile network operators (MNOs) must grapple with complex security management in fourth generation Long Term Evolution (4G LTE) deployments. The security architecture of 4G LTE may...
  • CSIAC Admin
    07/01/2015 - 1:21pm by CSIAC Admin
    Understanding the software development process and gathering data and metrics on the process is an important step to making better-informed cost and effort estimates, improving processes, and...