• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact Us
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Skip to primary navigation
  • Skip to main content
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
/ CSIAC Reports

CSIAC Reports

CSIAC reports offer timely cutting-edge information to address the needs of our user community.  CSIAC provides a variety of products developed by our subject matter experts (SMEs) in response to gap analyses and specific DoD stakeholder requirements related to our technical focus areas.  Here you will find a variety of document types including State-Of-The-Art Reports (SOARs), technical study results, CSIAC Podcast papers, Quick-to-Community (QTC) reports, process documents, and guidelines. CSIAC's goal is to provide relevant products to meet your cybersecurity, software development, information management and modeling & simulation needs.

Release Date   Title  

2004-11-16

Software Acquisition Gold Practice: Track Earned Value

Earned value project management involves planning work to a manageable level of detail such that it is feasible to allocate a portion of the budget to each planned work unit (work package), and then tracking progress by the accumulated “value” of completed work units. As work is performed, it is “earned” on the same basisRead More

2003-02-23

Wireless Wide Area Network (WWAN) Security

(.mil/.gov ONLY) Over the past few years, the use of wireless data devices, such as the BlackBerry unit by Research In Motion (RIM), has greatly increased within the Federal Government. The need for accessing E-mail remotely has been the primary market driver for this growth although device-to-device communications has also been a significant contributor. Nevertheless,Read More

2003-02-23

Embedded Software Maintenance

The goal of this report is to describe the state-of-the-art of embedded software maintenance and provide a glimpse of state-of-the-practice embedded maintenance practices. Section 2 introduces the area of embedded software based on embedded systems, the implication of embedded software and some of its characteristics. Section 3 describes the more general area of software maintenance,Read More

2003-01-01

Agile Software Development

The purpose of this report is to address this interest and provide a comprehensive overview of the current State-of-the-Art as well as State-of-the-Practice for Agile Methods. The first section discusses the history behind the trend, as well as the Agile Manifesto, a statement from the leaders of the Agile movement. The second section represents theRead More

2002-02-23

Network Centric Warfare

(.mil/.gov ONLY) This report is the second in a series, which identifies key metrics for measuring the effects of network centric warfare (NCW). Volume I introduced two sets of metrics associated with the Reason (i.e., Command and Control) and Physical Spheres of warfare, and made specific recommendations for how the Navy and Joint communities couldRead More

2002-02-23

Exploring Biotechnology: Opportunities for the Department of Defense

(.mil/.gov ONLY) Biotechnology has revolutionary potential for a broad range of U.S. military capabilities. Further, because of the United State’s unparalleled lead in research and development, biotechnology presents the opportunity to recast the framework of military operations and create a long term U.S. advantage in the global strategic environment. Biotechnology applications range from enhancing humanRead More

2002-02-23

Malicious Code

(.mil/.gov ONLY) This SOAR updates earlier reports to DoD on the subject of malicious code, describes common detection, and prevention techniques, and provides pointers to resources for enhancing organizational information security. This update was considered necessary because, over the past three years, there have been numerous malicious code incidents spread through E-mail and the Internet,Read More

2001-12-05

Software Tools for Knowledge Management

A variety of software tools for knowledge management have become available, some commercial and some academic. Not all tools that are labeled KM tools are indeed KM tools; their vendors attempt to make them more attractive by attaching this buzzword to them. The KM tools generally provide features such as search and database maintenance, intranetRead More

2001-11-16

Knowledge Management in Software Engineering

Is knowledge management one of those hyped concepts that rise quickly, ambitiously claims to cure organizational headaches and then fails and falls quietly? Or is it an instrument that will really help organizations address some of the problems they face while trying to achieve their business objectives? In particular, is knowledge management valuable to softwareRead More

2001-07-13

Verification, Validation, and Accreditation (VV&A) Automated Support Tools, A State of the Art Report: Part 2 – Details

This MSIAC State of the Art Report, divided into two parts, provides a compendium and an analysis of COTS, GOTS, and developmental automated tools that can be applied to the verification, validation, and accreditation (VV&A) of individual models and simulations (M&S) or of systems of models and simulations. This report, “Part 2 – Details”, ofRead More

  • « Go to Previous Page
  • Go to page 1
  • Interim pages omitted …
  • Go to page 3
  • Go to page 4
  • Go to page 5
  • Go to page 6
  • Go to page 7
  • Interim pages omitted …
  • Go to page 9
  • Go to Next Page »

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
US Department of Defense Logo USD(R&E) Logo DTIC Logo DoD IACs Logo

Copyright 2012-2021, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information
Accessibility / Section 508 | FOIA | Link Disclaimer | No Fear Act | Policy Memoranda | Privacy, Security & Copyright | Recovery Act | USA.Gov

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.