Search Selected Systems and Analyses Center Publications

Here you can search a selected set of publicly available publications and research from IDA's Systems and Analyses Center. 

Sort by: Relevance  |  Date
A Research and Development Investment Portfolio for Diminishing Manufacturing Sources and Material Shortages

June, 2018
This document lists and describes fields of study where research and development investments would be beneficial to the DMSMS management community.
Megatrend Issues in Artificial Intelligence and Autonomous Systems

August, 2018
Megatrends are sustained developments that fundamentally impact business, economy, society, cultures, and personal lives.
A State Cyber Hub Operations Framework

January, 2018
The Cyber Hub Operations Framework is intended to leverage, not replace, existing organizations and structures, and move states toward an operational cyber construct that is risk-based versus compliance-based.
Assessment of Graph Databases as a Viable Materiel Solution for the Army’s Dynamic Force Structure (DFS) Portal Implementation: Final Report

March, 2016
This document examines the maturity and applicability of two technologies –inverted index search engines and key:value pair data representations.
Assessment of Graph Databases as a Viable Materiel Solution for the Army’s Dynamic Force Structure (DFS) Portal Implementation: Part 3, Risks, Mitigation Approach, and Roadmap

December, 2017
Graph databases; Resource Description Framework (RDF); RDF triples store; JavaScript Object Notation (JSON); JSON Linked Data (JSON LD); Prolog; data lake; data swamp; data governance; data quality; risk management framework;....
Assessing Information Effects Workshop Proceedings

November, 2017
The workshop offered ideas on how to model the effects of information through a variety of analytical efforts to gain insight on a potential adversary’s behavior in cyber and information warfare.
Enterprise Level Security: Insider Threat Counter-Claims

October, 2017
Because Enterprise Level security (ELS) has no accounts or passwords, identity is an important issue; we review the data categories, data requirements, and data resources that apply to entity veracity, as well as the counter-....
Recommendations for Improving Agility in Risk Management for Urgent and Emerging Capability Acquisitions – Quick Look Report

October, 2016
This memorandum recommends changes in DoD Instruction 8510.01 for streamlining the process for obtaining and authorization to operate (ATO) for urgent and emerging capability acquisitions.
The Software Assurance State-of-the-Art Resource (SOAR)

August, 2016
Unintentional and intentionally inserted vulnerabilities in software can provide adversaries with various avenues to reduce system effectiveness, render systems useless, or even use our systems against us.
Assured Identity for Enterprise Level Security

July, 2017
Increasing threat intrusions to enterprise computing systems have led to a formulation of guarded enterprise systems.

<< 1 2 3 4 5 6 7 >>