Article Search

Research Articles

  • Automated AI/ML Application Development

    AI/ML is already used worldwide in programming and malware development; is it possible harness this capability to rapidly develop applications and scripts that aid cybers operators to perform offensive/defensive operations.  Also, what legal and ethical considerations (human in the loop, bias,

  • ICS/SCADA Cyber Hunt Kit

    Can we build a comprehensive cyber hunt kit with ICS/SCADA based-tools, that is all or mostly open-source to effectively hunt on ICS/SCADA networks with the lowest risk to the mission partner and the highest success to the team? 

  • Efficiency of Cargo Operations

    Conduct analysis on the command, control, and positioning of mobility aircraft globally to reduce dead legs and improve global reach.

  • Irregular and Unconventional Warfare Campaigning

    The SOE has renewed its focus on irregular and unconventional warfare. How can SOF better understand, articulate, and operationalize irregular and unconventional warfare campaigns? What is the relationship between irregular warfare, unconventional warfare, foreign internal defense, security force

  • How Do We Make Intelligence Support to Operations More Efficient?

    In the context of Agile Combat Employment (ACE), What strategies and modifications can be implemented in the Combat Information Network (CIN) and Mission Planning Team (MPT) workflows to increase efficiency, resilience, agility, and decrease waste in intelligence support operations? Is there a

  • Secure and Accessible Collaboration on Personally Owned Devices

    Given the current reliance of Air Force personnel on insecure commercial communication apps (such as GroupMe, Discord, Slack, WhatsApp, Facebook Messenger, and Signal) for operational and tactical coordination, can the Air Force provide a collaboration application to surpass these existing tools in