(.mil/.gov ONLY) The subject of Information Assurance (IA) has received increased attention over the last several years in the military modeling and simulation (M&S) community and, even more so, in the public domain. In the public domain, organizations are concerned with their ability to ensure the sanctity of their data and associated transactions across networks
CSIAC reports offer timely cutting-edge information to address the needs of our user community. CSIAC provides a variety of products developed by our subject matter experts (SMEs) in response to gap analyses and specific DoD stakeholder requirements related to our technical focus areas. Here you will find a variety of document types including State-Of-The-Art Reports (SOARs), technical study results, CSIAC Podcast papers, Quick-to-Community (QTC) reports, process documents, and guidelines. CSIAC's goal is to provide relevant products to meet your cybersecurity, software development, information management and modeling & simulation needs.
(.mil/.gov ONLY) The increasing technological sophistication of the Department of Defense (DoD) leads to a dependency on technology that, in turn, represents potentially crippling vulnerabilities. DoD is dependent upon advanced weapon systems and Command, Control, Communications, Computers, and Intelligence (C4I) systems throughout all mission areas from tactical to strategic. Preventing or minimizing the disruption, denial,
The goal of this report is to survey the state of the practice in COTS-based development. The report discusses the definition of COTS and COTS-based system. Then it lists and discusses pros, cons and issues in COTS-based development. The central part is dedicated to survey methods and techniques that can be useful in COTS-based development.
The purpose of this State of the Art Report (SOAR) is to organize the costs and benefits of Software Process Improvement (SPI) strategies, methods, approaches, and alternatives into a form and methodology that enables software managers to identify and select the SPI strategies that are most closely aligned with their business, organizational, and technical goals
(.mil/.gov ONLY) IA Metrics CR/TA This report establishes the fundamentals of metrics development methodology and metrics program establishment. It answers the following questions: – What are IA metrics? – Why do organizations need them? – How can they be used? – What is the process for developing IA metrics? – What are some of the
This MSIAC State of the Art Report is the first of two reports that provide a compendium and an analysis of COTS, GOTS, and developmental automated tools that can be applied to the verification, validation, and accreditation (VV&A) of individual models and simulations (M&S) or of systems of models and simulations. Part 1 – Overview,
(.mil/.gov ONLY) Attacks on DoD systems have expanded from simple wiretaps and viruses to session hijacks and trojan horses, and the types and sophistication of these attacks are constantly evolving. In response to these threats, DoD response has also evolved. In recognition of the growing threat and complexity of this problem, DoD developed the defense
(.mil/.gov ONLY) This report provides an overview of data mining techniques, applications, and COTS data mining software products. Data mining is used to discover previously unknown and meaningful relationships by sifting through large amounts of stored data. Data mining has applications in marketing, information assurance, risk management, and fraud management. To help users select a
This report discusses the state-of-the-art, as well as recent advances in the use of data mining techniques as applied to software process and product information. This report includes: a discussion on data mining techniques and how they can be used to analyze software engineering data; a bibliography on data mining with special emphasis on data
(.mil/.gov ONLY) Provides an assessment of the state-of-the-art in data embedding technology and its application to IA. It is particularly relevant to: information “providers” concerned about intellectual property protection and access control; information “consumers” who are concerned about the security and validation of critical information; and law enforcement, military, and corporate organizations concerned about efforts