• Home
  • Resources
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Store
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Cart
  • Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

header-right

Main navigation

  • Resources
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Topic Tags
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Store
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Cart
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
  • Cyber COI
/ Army Research Laboratory (ARL)

Topic: Army Research Laboratory (ARL)

Journal Issue

Cyber Science & Technology at the Army Research Laboratory (ARL)

Journal of Cyber Security and Information Systems

Volume: 5 Number: 1
Posted: 01/26/2017

Army Research Laboratory (ARL) Cyber Science & Technology

U.S. Army Research Laboratory has established a Collaborative Research Alliance, or CRA, which will include an alliance of ARL, U.S. Army Communications-Electronics Research, Development and Engineering Center, academia and industry researchers to explore the basic foundations of cyber science issues in the context of Army networks. ARL cyber research Read More

Download PDF: CSIAC_Journal_V5N1_FINAL_DRAFT_12-22-16-SH.pdf
Journal Article

Risk Analysis with Execution-Based Model Generation

Published in Journal of Cyber Security and Information Systems
Volume: 5 Number: 1 - Cyber Science & Technology at the Army Research Laboratory (ARL)

Authors: Jaime Acosta, Edgar Padilla, Xinming Ou, ...
Posted: 01/26/2017 | Leave a Comment

Analyzing risk is critical throughout the software acquisition lifecycle. System risk is assessed by conducting a penetration test, where ethical hackers portray realistic threat on real systems by exploiting vulnerabilities. These tests are very costly, limited in duration, and do not provide stakeholders with “what-if” analyses. To alleviate these issues, Read More

Pages: Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7
Journal Article

Information Security Continuous Monitoring (ISCM)

Published in Journal of Cyber Security and Information Systems
Volume: 5 Number: 1 - Cyber Science & Technology at the Army Research Laboratory (ARL)

Authors: Akhilomen Oniha, Greg Weaver, Curtis Arnold, ...
Posted: 01/26/2017 | Leave a Comment

The ability for commanders to know and understand an organizational attack surface, its vulnerabilities, and associated risks is a fundamental aspect of command decision-making. In the cyberspace domain, ongoing monitoring sufficient to ensure and assure effectiveness of security controls related to systems, networks, and cyberspace, by assessing security Read More

Pages: Page 1 Page 2 Page 3 Page 4
Journal Article

Security of Cyber-Physical Systems

Published in Journal of Cyber Security and Information Systems
Volume: 5 Number: 1 - Cyber Science & Technology at the Army Research Laboratory (ARL)

Author: Dr. Edward Colbert
Posted: 01/26/2017 | Leave a Comment

Cyber Physical Systems (CPSs) are electronic control systems that control physical machines such as motors and valves in an industrial plant. In a networked environment, the security of the physical machines depends on the security of the electronic control systems, but cybersecurity is not typically the main design concern. The main concern for CPSs is the Read More

Pages: Page 1 Page 2 Page 3 Page 4 Page 5
Journal Article

Synergistic Architecture for Human-Machine Intrusion Detection

Published in Journal of Cyber Security and Information Systems
Volume: 5 Number: 1 - Cyber Science & Technology at the Army Research Laboratory (ARL)

Authors: Dr. Noam Ben-Asher and Paul Yu
Posted: 01/26/2017 | Leave a Comment

Abstract Modern day detection of cyber threats is a highly manual process where teams of human analysts flag suspicious events while using assistive tools such as Bro and Snort. It is the analysts’ ability to discern suspicious activity and authority to make decisions on threats that place humans into central roles in the threat detection process. However, Read More

Pages: Page 1 Page 2 Page 3 Page 4
Journal Article

Machine Learning and Network Intrusion Detection: Results from Grammatical Inference

Published in Journal of Cyber Security and Information Systems
Volume: 5 Number: 1 - Cyber Science & Technology at the Army Research Laboratory (ARL)

Author: Dr. Richard Harang
Posted: 01/23/2017 | Leave a Comment

Machine learning for network intrusion detection is an area of ongoing and active research (see references in [1] for a representative selection), however nearly all results in this area are empirical in nature, and despite the significant amount of work that has been performed in this area, very few such systems have received nearly the widespread support Read More

Pages: Page 1 Page 2 Page 3
Journal Article

The Cyber Security Collaborative Research Alliance: Unifying Detection, Agility, and Risk in Mission-Oriented Cyber Decision Making

Published in Journal of Cyber Security and Information Systems
Volume: 5 Number: 1 - Cyber Science & Technology at the Army Research Laboratory (ARL)

Authors: Patrick McDaniel and Ananthram Swami
Posted: 01/23/2017 | Leave a Comment

Abstract: For military networks and systems, the cyber domain is ever-increasingly contested and congested space. Defenders of these systems must fight through adversary action in complex tactical and strategic environments. Just now completing its third year, the Cyber-Security Collaborative Research Alliance has sought to develop approaches for Read More

Pages: Page 1 Page 2 Page 3 Page 4 Page 5 Page 6
Journal Article

Cyber Science and Technology at the Army Research Laboratory

Published in Journal of Cyber Security and Information Systems
Volume: 5 Number: 1 - Cyber Science & Technology at the Army Research Laboratory (ARL)

Author: Dr. Alexander Kott
Posted: 01/23/2017 | Leave a Comment

The U.S. Army Research Laboratory (ARL) received the first salvos in the battle for cybersecurity as early as three decades ago. In terms of technology history, it was an astonishingly long time ago. Before most people ever heard of the Internet. Before there were web browsers. Long before the smartphones. Back in 1986, the laboratory withstood attacks by Read More

Pages: Page 1 Page 2
Journal Article

How Does an Analyst Select M&S to Support the Entire DoD Acquisition Lifecycle Process?

Published in Journal of Cyber Security and Information Systems
Volume: 3 Number: 1 - Applying Modeling & Simulation for Defense

Authors: Lana E. McGlynn, Christopher McGroarty, Christopher J. Metevier, ...
Posted: 02/09/2016 | Leave a Comment

Modeling and Simulation (M&S) users who require complex M&S typically do not have a long lifecycle for an experiment, analysis initiative or simulation-based event. To reduce cost, they need to use well-established simulation architectures and robust models that are easy to integrate with other simulations. This desire for a short lead time for Read More

Pages: Page 1 Page 2 Page 3 Page 4 Page 5
Air Force Research Laboratory (AFRL) Army Research Laboratory (ARL) Artificial Intelligence (AI) Better Buying Power (BBP) Biometric Cloud Computing Critical Infrastructure Protection (CIP) Cryptography Cyber Crime Cyber Legislation Cybersecurity Cybersecurity Training Cyber Warfare Data Breach Data Security Defense Technical Information Center (DTIC) Did You Know? DISA DoD Acquisition Lifecycle Encryption Hacking Insider Threat Internet of Things (IoT) Intrusion Detection IT Security Machine Learning Malware Mobile Security Modeling & Simulation National Institute of Standards and Technology [NIST] Network Security Open Source Software Operational Technology (OT) Password Security Phishing Protecting Controlled Unclassified Information (CUI) Quantum Computing Ransomware Risk Management Framework (RMF) Secure Software Software Assurance Software Engineering Vulnerability Wargaming Workplace Security

sidebar

Blog Sidebar

Featured Content

CSIAC Journal - Serious Games to Enhance Defense Capabilities

CSIAC Journal Cover Volume 5 Number 4

This 2017 special edition of the CSIAC Journal focuses on wargames and the many uses of Modeling and Simulation (M&S) that support decision making needed at the various levels of combat.

Read the Journal

CSIAC Report - Defense Acquisition University Secure Systems Design Course Experiment

CSIAC developed a course experiment with the Defense Acquisition University (DAU) Cybersecurity Enterprise Team. The goal of this exercise was to study the techniques & strategies used to provide cybersecurity-based training, in an effort to educate the entire acquisition workforce on cybersecurity best practices & techniques.

Read the Report

CSIAC Journal - Design and Development Process for Assured Software

CSIAC Journal Cover Volume 5 Number 2

This is Volume 1 of 2 special edition issues on Software Assurance. This edition explores different aspects of developing, deploying and training on how to build assured software.

Read the Journal

CSIAC Journal - Tools & Testing Techniques for Assured Software

CSIAC Journal Cover Volume 5 Number 3

This is Volume 2 of 2 special edition issues on Software Assurance. This edition explores different aspects of software assurance competencies that can be used to improve software assurance functions and how to develop/deploy assured software throughout the lifecycle acquisition process.

Read the Journal

Recent Video Podcasts

  • Systems Engineering Challenges for Integrating Software Assurance into Defense Systems Throughout the System Acquisition Lifecycle Series: CSIAC Webinars
  • CS Digest Roundtable #2: Meltdown/Spectre, NIST Framework, GDPR Policy, and Romanian Hackers Series: The CSIAC Podcast
  • CS Digest Roundtable #1: Emotet Trojan, Cryptojacking, and User Data Exposure Series: The CSIAC Podcast
  • Cybersecurity of DoD Critical Infrastructure Series: CSIAC Webinars
  • Challenges to Critical Infrastructure Series: Cyber Awareness Videos
View all Podcasts

Resource Topic Tags

Critical Infrastructure Protection (CIP) Data Security Internet of Things (IoT) Ransomware Cybersecurity Network Security Insider Threat Mobile Security Quantum Computing Cyber Warfare Workplace Security Cloud Computing Artificial Intelligence (AI) Cyber Legislation Phishing Protecting Controlled Unclassified Information (CUI) Risk Management Framework (RMF) Modeling & Simulation Software Assurance Password Security Software Engineering IT Security Encryption Hacking Malware National Institute of Standards and Technology [NIST] DoD Acquisition Lifecycle DISA Air Force Research Laboratory (AFRL) Intrusion Detection

Upcoming Events

Thu 26

MODSIM World 2018

April 24 - April 26
Norfolk VA
United States
May 01

SANS Automotive Cybersecurity Summit

May 1 - May 8
Chicago IL
United States
Organizer: SANS
May 14

Northsec

May 14 - May 20
Old Montreal Quebec
Canada
Jun 11

Transport Security and Safety Expo – TSSX 2018

June 11 - June 12
Washington DC
United States
Jun 25

AIAA Modeling and Simulation Technologies Conference

June 25 - June 29
Alanta GA
United States
View all Events

Recently Active Members

Profile picture of matthewpicerno
Profile picture of jhughes
Profile picture of lloydpinnock
Profile picture of majdacivic27
Profile picture of jonlancelot
Profile picture of nmaida
Profile picture of jf1776
Profile picture of majordavehan817
Profile picture of tdan
Profile picture of jreade
Profile picture of cspencer25a
Profile picture of dsebayan
Profile picture of jverick
Profile picture of davidt
Profile picture of harrisog
Profile picture of paulweinrich
Profile picture of mvansteenburg
Profile picture of rsrobinson77

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form
  • CSIAC Store

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
ASD(R&E) LogoUS Department of Defense LogoDoD IACs LogoDTIC LogoTEMS Logo

Copyright 2018, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information