Close
X
 

ITSD's Research

ITSD’s research delves into the seams and addresses the evolution of cyberspace. ITSD researchers are acutely aware of how the rapid expansion of cyber-related technologies affects society, which enables them to perform technology assessments and evaluate information environments to identify and eliminate vulnerabilities while strengthening operational advantages. In particular, ITSD focuses on advising DoD on critical cyber policy issues, assessing advanced concepts in rapidly evolving technologies while identifying and analyzing the attendant cyber risks, analyzing the cyber workforce and developing education and training programs, and using world-class content understanding skills to analyze and use large data collections.

ITSD’s major research areas include:

  • Securing the cyber supply chain/cybersecurity: Responding to evolving technology and business practices and examining their impact on weapons systems
  • Cybersecurity for the Defense Industrial Base (DIB) and the government as a whole: Anticipating and responding to interdependencies among stakeholders with national security interests
  • Information sharing and content understanding: Developing a means for sponsors to access, share, understand, and trust information
  • Cyber operations, including business IT: Anticipating and assessing disruptive technologies for rapid insertion to optimize operations
  • Cyber science and technology: Discovering and creating next-generation technologies for the national security community, including Defense Advanced Research Projects Agency (DARPA) and the Intelligence Advanced Research Projects Agency (IARPA)

Dr. Myers introducing speaker; RSM providing guidance

Information Technology and Systems Division
6

ITSD Home

ITSD Research

ITSD People

ITSD in the Research Community

ITSD Ideas

Current Job Openings at IDA
(under search options select Alexandria, VA for jobs in ITSD and other divisions)

  

ITSD - Selected Publications and Articles6

State-of-the-Art Resources (SOAR) for Software Vulnerability Detection, Test, and Evaluation 
Gregory N. Larsen, E. Kenneth Hong Fong, David A. Wheeler, Rama S. Moorthy, IDA Paper P-5061, July 2014

Open Source Software Projects Needing Security Investments
David Wheeler, IDA Document D-5459, June 2015
Related articles

Mining Measured Information from Text
Arun Maiya, IDA Document NSD-5436, June 2015
Related articles

Sharing Smart Card Authenticated Sessions Using Proxies
William Simpson, IDA Document NS D-5417, 2016
Related articles

Beyond Enterprise Resource Planning (ERP): The Next Generation Enterprise Resource Planning Environment
Laura A. Odell, Brendan T. Farrar-Foley, John R. Kinkel, Rama S. Moorthy, Jennifer A. Schultz, IDA Paper P-4852, February 2012

A State Cyber Hub Operations Framework
Laura A. Odell, Cameron E. DePuy, J. Corbin Fauntleroy, Andrew S. Ferguson, Robert M. Rolfe
IDA Document NS D-8008, June 2016

Enterprise Level Security: Securing Information Systems in an Uncertain World
William R. Simpson, CRC Press, April 2016

In-Use and Emerging Disruptive Technology Trends
Laura A. Odell, Brendan T. Farrar-Foley, J. Corbin Fauntleroy, Ryan R. Wagner
IDA Document NS D-5457, March 2015

Department of Defense Use of Commercial Cloud Computing Capabilities and Services
Laura A. Odell, Ryan R. Wagner, Tristan J. Weir, IDA Paper P-5287, November 2015

IDA Research Notes — Challenges in Cyberspace

spacer

Search ITSD Selected Publications