• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact Us
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Skip to primary navigation
  • Skip to main content
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
/ Journal Issues / Basic Complexity
Download PDF

Basic Complexity

Journal of Cyber Security and Information Systems

Volume: 4 Number: 2
Posted: 07/25/2016

Download PDF

From inviting complexity into our processes, or dealing with the complexities of quantum keys, to getting back to basics in security and training solutions, this issue of the CSIAC Journal explores unique concepts in advancing productivity and security.

Download PDF
« Focus on Air Force Research Laboratory’s Information Directorate
Modeling and Simulation Special Edition: Wargaming »

Articles In This Issue

  • Quantum Key Distribution: Boon or Bust?

    Authors: Logan O. Mailloux, Dr. Michael R. Grimaila, Douglas D. Hodson, ...
    Quantum Key Distribution (QKD) is an emerging cybersecurity technology which exploits the laws of quantum mechanics to generate shared secret keying material between two geographically separated parties. The unique nature of QKD shows promise for high-security applications such as those found in banking, government, and military environments. However, real-world QKD systems contain a variety of implementation non-idealities which can negatively impact system security and performance. This article provides an introduction to QKD for security professionals and describes recent developments in the field. Additionally, comments are offered on QKD’s advantages (i.e., the boon), its drawbacks (i.e., the bust), and its foreseeable viability as a cybersecurity technology.
  • Computer Supported Training Solutions: Discussion of a New Framework for Effective Development and Deployment

    Authors: Dr. Amela Sadagic and Maj Matthew C. Denney
    The potential that computer supported training solutions bring to the military training domain is fairly well recognized, yet we still do not see evidence of large scale adoption or effective deployment of these systems in military forces’ training practices. The opportunities these solutions offer consist not only in the precious resources they may save (material, logistics, human labor), but also in the training opportunities they provide, which would not be available or even possible otherwise.
  • Back to Basics: Firmware in NFV Security

    Author: Daksha Bhasker
    Carriers no longer want their speciality pizzas delivered in a box, fully baked with pre-determined toppings. In fact they figure that it is economical to purchase standard pizza ingredients wholesale, bake ginormous crusts and believe they can please their customers faster by delivering custom toppings by slice on demand.
  • Modeling and Simulation Data Integration – Inviting Complexity

    Author: Dr. Gary Allen
    This paper is an overview of various issues that arise regarding complexity of data integration when multiple modeling and simulation architectures are used in a Live-Virtual-Constructive (LVC) simulation network. Points include such items as conversion of units, differing data formats, and effects on technology performance. Examples are given of ways to mitigate complexity and the paper concludes with recommendations for network designers.

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
US Department of Defense Logo USD(R&E) Logo DTIC Logo DoD IACs Logo

Copyright 2012-2021, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information
Accessibility / Section 508 | FOIA | Link Disclaimer | No Fear Act | Policy Memoranda | Privacy, Security & Copyright | Recovery Act | USA.Gov

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT