Cyber-attacks will happen and so developing a means to isolate intrusions at sea and keep moving is imperative, said the Navy's top intelligence officer. Now, once security experts detect a cyber-attack, the typical response is shut down all systems and then scrub them for malicious code or software, said Vice Adm. Jan Tighe, Deputy Chief of Naval Read More
Topic: Cyber Decision Making
New Brain-Inspired Cybersecurity System Detects ‘Bad Apples’ 100 Times Faster
Sophisticated cybersecurity systems excel at finding "bad apples" in computer networks, but they lack the computing power to identify the threats directly. Read More
Information Security Continuous Monitoring (ISCM)

The ability for commanders to know and understand an organizational attack surface, its vulnerabilities, and associated risks is a fundamental aspect of command decision-making. In the cyberspace domain, ongoing monitoring sufficient to ensure and assure effectiveness of security controls related to systems, networks, and cyberspace, by assessing security Read More
Machine Learning and Network Intrusion Detection: Results from Grammatical Inference

Machine learning for network intrusion detection is an area of ongoing and active research (see references in [1] for a representative selection), however nearly all results in this area are empirical in nature, and despite the significant amount of work that has been performed in this area, very few such systems have received nearly the widespread support Read More
The Cyber Security Collaborative Research Alliance: Unifying Detection, Agility, and Risk in Mission-Oriented Cyber Decision Making

Abstract: For military networks and systems, the cyber domain is ever-increasingly contested and congested space. Defenders of these systems must fight through adversary action in complex tactical and strategic environments. Just now completing its third year, the Cyber-Security Collaborative Research Alliance has sought to develop approaches for Read More
Asymmetric Resilient Cybersecurity

We are delivering the theory, processes, methodologies, and algorithms that will enable a resilient cyber infrastructure with an asymmetric advantage to thwart adversaries who seek to infiltrate and damage our national security through digital means. The ARC resilience concept is built on a modification of the Observe-Orient-Decide-Act (OODA) loop that is Read More
Focus on Air Force Research Laboratory’s Information Directorate
Volume: 4 Number: 1

The US Air Force’s Rome Laboratory is the USAF research and development center for command, control, and communications and is responsible for planning and executing the USAF science and technology program. The Information Directorate develops information technologies for air, space and ground systems, partnering with other federal agencies, allied nations, Read More
Air Force Analytics for Decision Support

In this article, I summarize Air Force Models and Simulations (M&S) policy initiatives and M&S enhancements for decision support analytics for warfighters and acquisitions. The policy initiatives include implementing an M&S governance structure, instantiating a study governance oversight, and evaluating the analytic capability across the Air Read More