• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Skip to primary navigation
  • Skip to content
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
  • Cyber COI
/ Journal Issues / Basic Complexity
Download PDF

Basic Complexity

Journal of Cyber Security and Information Systems

Volume: 4 Number: 2
Posted: 07/25/2016

Download PDF

From inviting complexity into our processes, or dealing with the complexities of quantum keys, to getting back to basics in security and training solutions, this issue of the CSIAC Journal explores unique concepts in advancing productivity and security.

Download PDF
« Focus on Air Force Research Laboratory’s Information Directorate
Modeling and Simulation Special Edition: Wargaming »

Articles In This Issue

  • Quantum Key Distribution: Boon or Bust?

    Authors: Logan O. Mailloux, Dr. Michael R. Grimaila, Douglas D. Hodson, ...
    Quantum Key Distribution (QKD) is an emerging cybersecurity technology which exploits the laws of quantum mechanics to generate shared secret keying material between two geographically separated parties. The unique nature of QKD shows promise for high-security applications such as those found in banking, government, and military environments. However, real-world QKD systems contain a variety of implementation non-idealities which can negatively impact system security and performance. This article provides an introduction to QKD for security professionals and describes recent developments in the field. Additionally, comments are offered on QKD’s advantages (i.e., the boon), its drawbacks (i.e., the bust), and its foreseeable viability as a cybersecurity technology.
  • Computer Supported Training Solutions: Discussion of a New Framework for Effective Development and Deployment

    Authors: Dr. Amela Sadagic and Maj Matthew C. Denney
    The potential that computer supported training solutions bring to the military training domain is fairly well recognized, yet we still do not see evidence of large scale adoption or effective deployment of these systems in military forces’ training practices. The opportunities these solutions offer consist not only in the precious resources they may save (material, logistics, human labor), but also in the training opportunities they provide, which would not be available or even possible otherwise.
  • Back to Basics: Firmware in NFV Security

    Author: Daksha Bhasker
    Carriers no longer want their speciality pizzas delivered in a box, fully baked with pre-determined toppings. In fact they figure that it is economical to purchase standard pizza ingredients wholesale, bake ginormous crusts and believe they can please their customers faster by delivering custom toppings by slice on demand.
  • Modeling and Simulation Data Integration – Inviting Complexity

    Author: Dr. Gary Allen
    This paper is an overview of various issues that arise regarding complexity of data integration when multiple modeling and simulation architectures are used in a Live-Virtual-Constructive (LVC) simulation network. Points include such items as conversion of units, differing data formats, and effects on technology performance. Examples are given of ways to mitigate complexity and the paper concludes with recommendations for network designers.

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
ASD(R&E) LogoUS Department of Defense LogoDoD IACs LogoDTIC LogoTEMS Logo

Copyright 2018, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More