U.S. Army Research Laboratory has established a Collaborative Research Alliance, or CRA, which will include an alliance of ARL, U.S. Army Communications-Electronics Research, Development and Engineering Center, academia and industry researchers to explore the basic foundations of cyber science issues in the context of Army networks. ARL cyber research
The Journal of Cyber Security and Information Systems
The Journal of Cyber Security and Information Systems is a quarterly journal focusing on scientific and technical research & development, methods and processes, policies and standards, security, reliability, quality, and lessons learned case histories.
Welcome to this special modeling and simulation (M&S) edition of the Journal of Cyber Security & Information Systems, published by the Cyber Security & Information Systems Information Analysis Center (CSIAC). This edition focuses on wargaming, a key cylinder of the Department of Defense’s (DoD’s) innovative engine.
From inviting complexity into our processes, or dealing with the complexities of quantum keys, to getting back to basics in security and training solutions, this issue of the CSIAC Journal explores unique concepts in advancing productivity and security.
The US Air Force’s Rome Laboratory is the USAF research and development center for command, control, and communications and is responsible for planning and executing the USAF science and technology program. The Information Directorate develops information technologies for air, space and ground systems, partnering with other federal agencies, allied nations,
This special edition of the CSIAC Journal focuses on Modeling & Simulation. In coordination with the Defense Modeling & Simulation Coordination Office, the current state of M&S across the US Defense Community is presented to our readers to raise awareness and to encourage interest. We hope you enjoy it.
This issue begins with an article by Rick Murphy describing how to represent type safety in a technical architecture, providing four examples from a type safe technical architecture in UML and one example of compile-time type checking. Then, John Lawson III examines why the Department of Defense has difficulty keeping up with the technical achievements and
This issue presents a framework for achieving information dominance across organizations. It also looks at the successful use of M&S throughout the acquisition life cycle in a Department of Defense program. And it discusses challenges M&S analysts face in today's environment of limited time and resources for system development, from beginning to end.
This issue looks at the attempts to apply game theory to various aspects of security situations. Also, the explosive growth in the use of instant messaging has resulted in an increased risk to sensitive and personal information and safety due to the influx of cybercrimes. Cyber forensic techniques are needed to assist cybercrime decision support tools in
This journal discusses knowledge management, "bring your own device" and the challenges of syncing calendars, more effective search through "Dynamic Tailoring", and the Behavioral Economics of Cybersecurity.
This journal discusses cyber risks to transportation control systems, the Schedule Compliance Risk Assessment Methodology (SCRAM), and security for mobile network operators.