Visible to the public Cyber AcquisitionConflict Detection Enabled

TitleCyber Acquisition
Publication TypeJournal Article
Year of Publication2019
AuthorsKlemas, Thomas, Lively, Rebecca K, Choucri, Nazli
JournalThe Cyber Defense Review
Pagination103–120
ISSN2474-2139
KeywordsA-K means, Adaptive Clustering, DDoS, RQA
AbstractThe United States of America faces great risk in the cyber domain because our adversaries are growing bolder, increasing in number, improving their capabilities, and doing so rapidly. Meanwhile, the associated technologies are evolving so quickly that progress toward hardening and securing this domain is ephemeral, as systems reach obsolescence in just a few years and revolutionary paradigm shifts, such as cloud computing and ubiquitous mobile devices, can pull the rug out from the best-laid defensive planning by introducing entirely new regimes of operations. Contemplating these facts in the context of Department of Defense (DoD) acquisitions is particularly sobering because many cyber capabilities bought within the traditional acquisition framework may be of limited usefulness by the time that they are delivered to the warfighter. Thus, it is a strategic imperative to improve DoD acquisitions pertaining to cyber capabilities. This paper proposes novel ideas and a framework for addressing these challenges.
URLhttps://cyberdefensereview.army.mil/CDR-Content/Articles/Article-View/Article/2035034/cyber-acquisit...
DOIhttps://www.jstor.org/stable/26846123
Reprint EditionSPECIAL EDITION: International Conference on Cyber Conflict (CYCON U.S.)
Citation Keyklemas_lively_choucri_2019