An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
Army Cyber Institute
At West Point
Army Cyber Institute
Search cyber.army.mil:
Search
Search
Search cyber.army.mil:
Search
Cyber Strategic Partners
Cyber Strategic Partners
Army Cyber Command
Army Cyber Center of Excellence
West Point Cyber Research Center
Pre-Commissioning Information
Research
All ACI Research
Jack Voltaic
Threatcasting
Research Labs
Intelligent Cyber-Systems and Analytics
Internet of Things
Cyber Modeling & Simulation
Cognitive Security
Library
ACI Digital Commons
Media Coverage
The Cyber Defense Review
Cyber Doctrine (PKI)
ACI Youtube
Archive
CyCON US
Future Conflict Graphic Novels
Work With Us
Careers
CNOQC Pilot
Request ACI Support
About Us
About the ACI
About West Point
ACI Leadership
ACI Research Team
Affiliated Researchers
Advisors Emeritus
Home
:
News
Sort by Article Category
Article Category Search
Publications
...Book
...Book Chapter
...Conference Paper
...Dissertation
...Edited Journal
...Journal Paper
...Law Review
...Magazine Article
...Military PME Journals
Technical Reports & White Papers
...Technical Reports
...White Paper
News and Media 2015
News and Media 2016
News and Media 2017
News and Media 2018
News and Media 2019
News and Media 2020
News and Media 2021
News and Media 2022
News and Media 2023
Threat Reports
Threatcasting Articles
Intelligent Cyber Systems and Analytics Research Lab
CyCon US 2016
CyCon US 2017
CyCon US 2018
Summer Internship Program
Featured Articles
PUBLICATIONS
1
...
21
22
23
24
25
26
27
28
29
30
...
34
Why PPD-41 is evolutionary, not revolutionary
October 24, 2016
— "The Obama administration released Presidential Policy Directive 41 in July to clarify roles and responsibilities in response to a major cyber incident, but it has yet to be put to the test and questions remain whether it substantially changes what has been in practice to this point.A panel at the Army Cyber Institute's CyCon U.S. conference in...
MORE
Clinton’s encryption solution would require a ton of oversight
October 23, 2016
— "Law enforcement taking advantage of zero day exploits is preferred to an overarching encryption “backdoor” law, a group of cryptography, security policy and digital privacy experts said Friday during a panel discussion at the 2016 CyCon U.S. cybersecurity conference.And yet, those experts say the inherent dangers in relying on zero days cannot be...
MORE
Warner: Procurement and personnel key for cyber
October 23, 2016
— "Fixing the way the U.S. government buys technology and hires and deploys its workforce is the key to improving the nation’s cybersecurity defenses, not changing the way authorities and responsibilities are divided up between federal agencies, Sen. Mark Warner, D-Va., said Friday.The fact that the National Security Agency has primary responsibility...
MORE
Evaluating Single Board Computer Clusters for Cyber Operations
October 21, 2016
— The emergence of single board computers (SBCs) has enabled individuals cheap and portable access to multicore architectures. In this paper, we discuss the use of SBC clusters to assist in cyberspace operations. The small form-factor of SBCs make them highly portable, allowing soldiers to easily transport individual units and clusters. While each...
MORE
A Capstone Design Project for Teaching Cybersecurity to Non-technical Users
October 1, 2016
— This paper presents a multi-year undergraduate computing capstone project that holistically contributes to the development of cybersecurity knowledge and skills in non-computing high school and college students. We describe the student-built Vulnerable Web Server application, which is a system that packages instructional materials and pre-built...
MORE
FBI Cyber: Preventing Tomorrow’s Threats Today
September 19, 2016
— FBI Cyber Division acknowledges that it currently is a reactive organization. However, in the near future, FBI Cyber sees itself as being a proactive agent able to detect, investigate, and deter criminals using the tools at its disposal to greater effectiveness. This paper delves into the core competencies of the FBI throughout its history and...
MORE
Strategic Broadening for Mid-Career Cyber Leaders
September 13, 2016
— The purpose of this paper is to highlight the need for strategic broadening and policy education for mid-career Cyberspace leaders, while also providing an overview of available broadening programs that have a short-term, in-person format. As any leader progresses through the ranks, the Army often requires different skills at higher levels of...
MORE
Army wants cyber capability everywhere
September 13, 2016
— "The Army's new cyber director said the service is still struggling to make cyber, electronic warfare and information operations tangible to warfighters.Speaking at West Point's annual Mad Scientist Conference, Brig. Gen. Patricia Frost said the Army's "cyber mission force is on track," but the service lacks a coherent electronic warfare strategy."
MORE
Strategic Broadening for Mid-Career Cyber Leaders
September 13, 2016
— "The purpose of this paper is to highlight the need for strategic broadening and policy education for mid-career Cyberspace leaders, while also providing an overview of available broadening programs that have a short-term, in-person format. As any leader progresses through the ranks, the Army often requires different skills at higher levels of...
MORE
Training Future Cyber Officers - An Analysis of the US Army ROTC’s Efforts to Produce Quality Junior Cyber Officers
September 10, 2016
— The emergence of cyberspace as a recognized warfighting domain has heralded monumental changes in the US Army’s mission, focus, and structure over the past several years. Currently, the US Army is moving to field the next generation of cyber warfighters, and the need to identify, train, and develop these cyber professionals is becoming...
MORE
1
...
21
22
23
24
25
26
27
28
29
30
...
34