Security incidents associated with Internet of Things (IoT) devices have recently gained high visibility, such as the Mirai botnet that exploited vulnerabilities in remote cameras and home routers. Currently, no industry standard exists to provide the right combination of security and ease-of-use in a low-power, low-bandwidth environment. In 2017, the Thread Read More
Journal Articles:
Rebooting Letters of Marque for Private Sector Active Cyber Defense
The views expressed in this paper are those of the author and do not reflect the official policy or position of the 780th Military Intelligence Brigade, U.S. Intelligence and Security Command, Department of the Army, Department of the Navy, Department of Defense, or the U.S. Government. Letters of Marque for Private Sector Cyber Defense Cyber assaults on Read More
Evaluation of Comprehensive Taxonomies for Information Technology Threats
Categorization of all information technology threats can improve communication of risk for an organization’s decision-makers who must determine the investment strategy of security controls. While there are several comprehensive taxonomies for grouping threats, there is an opportunity to establish the foundational terminology and perspective for Read More
Times Change and Your Training Data Should Too: The Effect of Training Data Recency on Twitter Classifiers
Sophisticated adversaries are moving their botnet command and control infrastructure to social media microblogging sites such as Twitter. As security practitioners work to identify new methods for detecting and disrupting such botnets, including machine-learning approaches, we must better understand what effect training data recency has on classifier Read More
Optimizing for Mission Success Using a Stochastic Gaming Simulation
This article describes how mission scenarios created using gaming software can be used as a graphical concept of operations (CONOPS) and optimized to ensure the highest probability of mission success. Traditional optimization methods have not been designed for mission-level problems, where highly uncertain environmental and operational parameters influence Read More
Enabling Joint Synthetic Training Interoperability through Joint Federated Common Data Services
The Joint Training Enterprise (JTE) requires effective integration of and technical interoperability among disparate synthetic training capabilities from across the Services to enhance joint operational capability and achieve joint readiness. Opportunities to enhance joint training interoperability increase when disparate synthetic training capabilities Read More
View and Viewpoint Based Digital Signoff using OpenMBEE as an Authoritative Source of Truth
Following the DoD’s Digital Engineering (DE) strategy NAVAIR’s Systems Engineering Transformation (SET) Framework investigates the modeling, feasibility and collaboration with an Authoritative Source of Truth (AST) as part of a digital engineering environment. This ongoing research investigates the use of SysML together with OpenMBEE as an AST for a more Read More
Hybrid Network Emulation with Cyber and Electronic Warfare Effects
Hybrid network emulation (HNE) [9], [10], [11] is comprised of a discrete-event simulated links/networks and virtual machines (VMs)/containers that send and receive traffic through such links/or networks (e.g., Figure 1). It allows testing network applications rather than their models on simulated target networks, particularly mobile wireless networks Read More
Reconfigurable Signal-Injection Missile Simulation (RSIMS)
A Case Study of Innovation through the Implementation of a Common Architecture and the Creation of a Collaborative Development Environment Modeling and simulation has been used in the development of electro-optical and infrared (EO/IR) missile systems for many years. For this application, there are three basic types of simulations, all-digital, Read More
AFSIM: The Air Force Research Laboratory’s Approach to Making M&S Ubiquitous in the Weapon System Concept Development Process
The idea behind AFSIM is a common modeling framework, using common models in a common environment with a common threat laydown. To encourage buy-in across government and industry, AFRL not only built a robust product but also made the software, source code, and training available to approved users free of charge. To date, AFRL has licensed AFSIM to over 275 Read More