From inviting complexity into our processes, or dealing with the complexities of quantum keys, to getting back to basics in security and training solutions, this issue of the CSIAC Journal explores unique concepts in advancing productivity and security.
The Journal of Cyber Security and Information Systems
The Journal of Cyber Security and Information Systems is a quarterly journal focusing on scientific and technical research & development, methods and processes, policies and standards, security, reliability, quality, and lessons learned case histories.
The US Air Force’s Rome Laboratory is the USAF research and development center for command, control, and communications and is responsible for planning and executing the USAF science and technology program. The Information Directorate develops information technologies for air, space and ground systems, partnering with other federal agencies, allied nations,
This special edition of the CSIAC Journal focuses on Modeling & Simulation. In coordination with the Defense Modeling & Simulation Coordination Office, the current state of M&S across the US Defense Community is presented to our readers to raise awareness and to encourage interest. We hope you enjoy it.
This issue begins with an article by Rick Murphy describing how to represent type safety in a technical architecture, providing four examples from a type safe technical architecture in UML and one example of compile-time type checking. Then, John Lawson III examines why the Department of Defense has difficulty keeping up with the technical achievements and
This issue presents a framework for achieving information dominance across organizations. It also looks at the successful use of M&S throughout the acquisition life cycle in a Department of Defense program. And it discusses challenges M&S analysts face in today's environment of limited time and resources for system development, from beginning to end.
This issue looks at the attempts to apply game theory to various aspects of security situations. Also, the explosive growth in the use of instant messaging has resulted in an increased risk to sensitive and personal information and safety due to the influx of cybercrimes. Cyber forensic techniques are needed to assist cybercrime decision support tools in
This journal discusses knowledge management, "bring your own device" and the challenges of syncing calendars, more effective search through "Dynamic Tailoring", and the Behavioral Economics of Cybersecurity.
This journal discusses cyber risks to transportation control systems, the Schedule Compliance Risk Assessment Methodology (SCRAM), and security for mobile network operators.
This journal issue covers Supervisory Control and Data Acquisition (SCADA) systems. Articles in this issue discuss how SCADA systems can improve efficiency but also present new challenges. How those challenges can be addressed by applying agile software engineering methods to systems engineering.
This issue discusses advances in the acquisition of secure systems based on open architectures. It also attempts to quantify productivity in software development projects.