Empower DoD, other government agencies, industry partners, and academia to effectively utilize modeling and simulation capabilities, including emulators, prototypes, simulators, and stimulators, either statically or over time, to develop data as a basis for making managerial or technical decisions. It includes all classes of M&S, including the interface of real-world systems with models or simulations, as well as working with model elements, standards and specifications, and modeling system descriptions, interfaces, and data communication methods.
-
This is the first CS Digest show of the CSIAC Podcast. The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics. In today's show we here at the CSIAC take the…
-
The substantial cyber threat to the nation's Critical Infrastructure is the context for this discussion on DoD policy concerns and current R&D efforts. Topics will include Weasel Board being developed at Sandia National Laboratory, More Situational Awareness for Industrial Control Systems (MOSAICS), sponsored by PACOM and NORTHCOM, and recent policy concerns relating to cyber security…
-
Did you know you can choose which CSIAC announcements and services to be notified about? In your profile settings, click email subscriptions and set your email preferences and click Update Subscription Settings.
-
Did you know you can change the email address for your CSIAC notifications? Simply go to your settings in your account profile and update your email in which a confirmation will be sent to your old email address for verification. If by chance you no longer have access to your old email account, email info@csiac.org…
-
The Cyber Security and Information Systems Information Analysis Center (CSIAC), a Defense Technical Information Center (DTIC) sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing, is currently accepting submissions for upcoming releases of the CSIAC Journal. CSIAC publishes the Journal of Cyber Security and…
-
The goal of the DoD Cybersecurity Policy Chart is to capture the tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware, in a helpful organizational scheme. The use of color, fonts and hyperlinks are all designed to provide additional assistance to cybersecurity professionals navigating their way through policy…
-
Serious Games to Enhance Defense Capabilities - Modeling & Simulation Special Edition
Volume 5 Issue 4This 2017 special edition of the CSIAC Journal focuses on wargames and the many uses of Modeling and Simulation (M&S) that support decision making needed at the various levels of combat. In this issue you will find a selection of topics ranging from the uses of serious games for education and training to use of early…Posted: 12/04/2017 15:43:37Journal -
Tools & Testing Techniques for Assured Software - DoD Software Assurance Community of Practice: Volume 2
Volume 5 Issue 3This issue is a special Software Assurance (SwA) edition of the Journal of Cyber Security & Information Systems, published by the Cyber Security & Information Systems Information Analysis Center (CSIAC). This edition explores different aspects of software assurance competencies that can be used to improve software assurance functions and how to develop/deploy assured software throughout…Posted: 11/02/2017 13:15:23Journal -
You can invite your friends and colleagues to join the CSIAC and subscribe to our free services. This short video shows you how.
-
CSIAC provides hardcopies of technical journals and other products to the community. Most publications are free and only require shipping and handling fees.
-
CSIAC provides up to four hours of FREE technical research and analysis to answer users’ most pressing technical questions. Learn more and submit a technical inquiry. Did you know that challenging technical problems that are beyond the scope of the free 4 hour technical inquiry can be investigated with a Core Analysis Task (CAT) request?…
-
CSIAC.org group members can discuss technical topics and ask questions in the Group Forums. It is one way a CSIAC.org member can contribute to the community of practice.
-
This video shows you how to create an account and explains some of the benefits of having an account on CSIAC.org
-
Do you want a record of all the CSIAC webinars you have attended? This short video shows you how.
-
The DoD has outlined a Strategic Vision and goals for DoD Modeling and Simulation (M&S). One of the goals is to "Promote the sharing of tools, data, and information across the DoD Enterprise," to enable reuse and interoperability of models, simulations, and associated data. Providing visibility into the Modeling & Simulation (M&S) resources across the…
-
Design and Development Process for Assured Software - DoD Software Assurance Community of Practice: Volume 1
Volume 5 Issue 2Welcome to this special Software Assurance (SwA) edition of the Journal of Cyber Security & Information Systems, published by the Cyber Security & Information Systems Information Analysis Center (CSIAC).Posted: 07/13/2017 18:46:56Journal -
I recently moderated a workshop for AFOSR on Future Directions in Machine Learning (FDML). I am pulsing the community for feedback on newer developments. Would any of you be interested in providing feedback on Generative Adversarial Networks(GAN)? For reference see this article: https://medium.com/towards-data-science/generative-adversarial-networks-history-and-overview-7effbb713545
-
Background An increasing number of organizations are moving their existing infrastructure to the cloud because of the benefits it affords them. According to RightScale, 72 percent of enterprises have adopted a private cloud model (2017). It is crucial that companies have an understanding of the various cloud deployment models, considerations that must be taken into…
-
The Cyber Proving Ground (CPG) is a collaborative effort between 24th Air Force, 25th Air Force, and the Air Force Life Cycle Management Center. It enables and supports high performance teams assembled from the breadth of the Air Force cyber community of interest and external partners to rapidly assess the applicability of emerging concepts and…
-
Modern weapons systems have depended on microelectronics since the inception of integrated circuits over fifty years ago. Today, most electronics contain programmable components of ever increasing complexity. At the same time, the Department of Defense (DoD) has become a far less influential buyer in a vast, globalized supplier base.3 Consequently, assuring that defense electronics are…
- Load More