An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
Army Cyber Institute
At West Point
Army Cyber Institute
Search cyber.army.mil:
Search
Search
Search cyber.army.mil:
Search
Cyber Strategic Partners
Cyber Strategic Partners
Army Cyber Command
Army Cyber Center of Excellence
West Point Cyber Research Center
Pre-Commissioning Information
Research
All ACI Research
Jack Voltaic
Threatcasting
Research Labs
Intelligent Cyber-Systems and Analytics
Internet of Things
Cyber Modeling & Simulation
Cognitive Security
Library
ACI Digital Commons
Media Coverage
The Cyber Defense Review
Cyber Doctrine (PKI)
ACI Youtube
Archive
CyCON US
Future Conflict Graphic Novels
Work With Us
Careers
CNOQC Pilot
Request ACI Support
About Us
About the ACI
About West Point
ACI Leadership
ACI Research Team
Affiliated Researchers
Advisors Emeritus
Home
:
News
Sort by Article Category
Article Category Search
Publications
...Book
...Book Chapter
...Conference Paper
...Dissertation
...Edited Journal
...Journal Paper
...Law Review
...Magazine Article
...Military PME Journals
Technical Reports & White Papers
...Technical Reports
...White Paper
News and Media 2015
News and Media 2016
News and Media 2017
News and Media 2018
News and Media 2019
News and Media 2020
News and Media 2021
News and Media 2022
News and Media 2023
Threat Reports
Threatcasting Articles
Intelligent Cyber Systems and Analytics Research Lab
CyCon US 2016
CyCon US 2017
CyCon US 2018
Summer Internship Program
Featured Articles
PUBLICATIONS
1
...
23
24
25
26
27
28
29
30
31
32
...
34
Bring on the Cyber Attacks — The Increased Predatory Power of the Reluctant Red Queen in a Nation-State Cyber Conflict
May 30, 2016
— The militarized and contested Internet with a multitude of state-sponsored cyberattacks can generate an evolutionary process when the targeted nation is strengthened by the abundance of information it receives from the attacks. When the targeted nation restrains from retaliating against the attacking adversarial state its systems are perfected,...
MORE
Why Government Organizations Don’t Care: Perverse Incentives and an Analysis of the OPM Hack
May 24, 2016
— Many security experts have addressed the financial and personal security risks involved with the recent data breach at the Office of Personnel Management (OPM). This work supplements previous analyses of the event, and explores how the recently disclosed OPM breach has impacted the national security of the United States. By examining the elements...
MORE
Indiana Exercising Plans to Combat Cyber Threats: Preparing for CRIT-EX 2016
May 6, 2016
— Indiana has purposefully adopted a culture of collaboration between government organizations, private firms, non-profits, and academia to improve the state’s response and resiliency to a significant cyber incident. This team approach will counter cyberattacks intent on degrading Indiana’s economic capacity and threating the critical services of its...
MORE
Fast and simple modular interpolation using factorial representation
May 1, 2016
— We study a representation for polynomial functions over finite rings. This factorial representation is particularly useful for fast interpolation, and we show that it is computationally preferable to the Lagrange Interpolation Formula (LIF) and to Newton interpolation over finite fields and rings. Moreover, over arbitrary finite rings the...
MORE
IoT attacks threaten national security, say cyber experts
April 22, 2016
— "Dams, the power grid and other such infrastructure were once closed network systems. Then they were added to the Internet."We still thought of them as closed networks -- but they're not," said Lt. Gen. Edward Cardon, commander of U.S. Army Cyber Command and Second Army."Other systems touch them and that starts to create some problems," such as...
MORE
Palo Alto Networks CEO on cybersecurity vs. privacy
April 22, 2016
— "Palo Alto Networks CEO Mark McLaughlin on efforts to improve cybersecurity."
MORE
Wanted: talented cyber operators
April 22, 2016
— "Regarding cyber, "we are training in the dozens and our adversaries are training in the thousands," said Lt. Gen. Edward Cardon, referencing what he heard at a cyber briefing at Carnegie Mellon, one of the top cybersecurity universities in the world.Cardon, commander, U.S. Army Cyber Command and Second Army, spoke at the Army Cyber Institute and...
MORE
Critical Infrastructure Vulnerable to Attack, NSA Leader Says
April 21, 2016
— "Strong dependence on industrial control systems, or ICS, is a serious vulnerability for industry, the National Security Agency’s deputy director said here yesterday. "There's no doubt that Chinese military planners understand the importance of industrial control systems and the critical infrastructure they control," Richard H. Ledgett Jr. said in...
MORE
Former NSA Director: U.S. Needs Security, Privacy
April 21, 2016
— "Top military and industry leaders convened at a cyber-summit at West Point, New York Thursday to discuss the latest advancements and struggles in America's fight against cyber terrorism.During an interview with the FOX Business Network’s Jo Ling Kent, former NSA Director and General Keith Alexander discussed new demand for more privacy and...
MORE
Homeland Security Secretary: No imminent threat to U.S.
April 21, 2016
— "Department of Homeland Security Secretary Jeh Johnson talks exclusively with FBN’s Jo Ling Kent at the West Point Cyber Security Summit about cyber terrorism."
MORE
1
...
23
24
25
26
27
28
29
30
31
32
...
34