Advanced Search

Content Type

Topics

Publication Date

New This Month

  • Architecting for Sustainable Software Delivery April 2014 - Article This article explains five architecture practices that support the evolving software system and delivery of new capabilities.
  • The CERT C Coding Standard: 98 Rules for Developing Safe, Reliable, and Secure Systems, Second Edition April 2014 - Book In this book, Robert Seacord provides rules to help programmers ensure that their code complies with the new C11 standard and earlier standards, including C99.
  • International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany April 2014 - Technical Report This report analyzes insider threat mitigation in India and Germany, using the new framework for international cybersecurity analysis described in the paper titled “Best Practices Against Insider Threats in All Nations.”
  • Introduction to Information Security: A Strategic-Based Approach April 2014 - Book The authors provide a strategy-based introduction to providing defenses as a basis for engineering and risk-management decisions in the defense of information.
  • Modeling Malicious Domain Name Take-Down Dynamics: Why eCrime Pays April 2014 - Conference Paper In this paper, Jonathan Spring derives an ad-hoc model of the competition for domain names by criminals and defenders using a modification of Lanchester’s equations for combat.
  • Three Variations on the V Model for System and Software Testing April 2014 - Podcast In this podcast, Don Firesmith presents three variations on the V model of software or system development.
  • Advanced Mobile Systems Initiative April 2014 - Brochure This brochure describes how the AMS initiative supports the mobile communication and mobile-computing needs of edge users.
  • Towards Quantitative Metrics for Architecture Models April 2014 - Presentation This presentation was part of the First International Workshop on Software Architecture Metrics, held at the 11th Working IEEE/IFIP Conference on Software Architecture.
  • On the Challenges in Extracting Metrics from Java Bytecode April 2014 - Presentation This presentation was part of the First International Workshop on Software Architecture Metrics, held at the 11th Working IEEE/IFIP Conference on Software Architecture.
  • Empirical Evaluation of the Understandability of Architectural Component Diagrams April 2014 - Presentation This presentation was part of the First International Workshop on Software Architecture Metrics, held at the 11th Working IEEE/IFIP Conference on Software Architecture.
  • Metrics for Sustainable Software Architectures: An Industry Perspective April 2014 - Presentation This presentation was part of the First International Workshop on Software Architecture Metrics, held at the 11th Working IEEE/IFIP Conference on Software Architecture.
  • Welcome to SAM 2014 April 2014 - Presentation This presentation was part of the First International Workshop on Software Architecture Metrics, held at the 11th Working IEEE/IFIP Conference on Software Architecture.
  • March 2014

    February 2014

    • Maximizing Trust in the Wireless Emergency Alerts (WEA) Service February 2014 - Special Report This report presents recommendations for stakeholders of the Wireless Emergency Alerts (WEA) service that resulted from the development of two trust models, focusing on how to increase both alert originators’ and the public’s trust in WEA.
    • Wireless Emergency Alerts: Trust Model Simulations February 2014 - Special Report This report presents four types of simulations run on the public trust model and the alert originator trust model developed for the Wireless Emergency Alerts (WEA) service, focusing on how to increase both alert originators’ and the public’s trust in WEA.
    • Wireless Emergency Alerts: Trust Model Technical Report February 2014 - Special Report This report describes a trust model to enable the Federal Emergency Management Agency to maximize the effectiveness of the Wireless Emergency Alerts (WEA) service and provides guidance for alert originators in using WEA to maximize public safety.
    • Commercial Mobile Alert Service (CMAS) Scenarios February 2014 - Special Report This report provides operational and development mission threads to help emergency alert originators analyze scenarios that will aid them in adopting and integrating the Commercial Mobile Alert Service (CMAS) into their emergency management systems.
    • Commercial Mobile Alert Service (CMAS) Alerting Pipeline Taxonomy February 2014 - Technical Report This report presents the Commercial Mobile Alert Service (CMAS) Alerting Pipeline Taxonomy, a hierarchical classification that encompasses four elements of the alerting pipeline, to help stakeholders understand and reason about required CMAS operations.
    • Wireless Emergency Alerts: New York City Demonstration February 2014 - Special Report This report describes the adoption of the Wireless Emergency Alerts (WEA) service by the New York City Office of Emergency Management. As the first alert originator to adopt WEA, its experiences provide lessons learned for other emergency managers.
    • Best Practices in Wireless Emergency Alerts February 2014 - Special Report This report presents four best practices for the Wireless Emergency Alerts (WEA) service, including implementing WEA in a local jurisdiction, training emergency staff in using WEA, cross-jurisdictional governance of WEA, and cybersecurity risk management.
    • Study of Integration Strategy Considerations for Wireless Emergency Alerts February 2014 - Special Report This report identifies key challenges and offers recommendations for alert originators navigating the process of adopting and integrating the Wireless Emergency Alerts (WEA) service into their emergency management systems.
    • The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) February 2014 - Podcast ES-C2M2 helps improve the operational resilience of the U.S. power grid.
    • Software Assurance for Executives Definitions February 2014 - Educational Material In this document, the authors provide definitions of terms used in the Software Assurance for Executives Course.
    • Software Assurance for Executives Acronyms February 2014 - Educational Material This document defines the acronyms used in the Software Assurance for Executives course.
    WebinarSeries092013
    SEI Podcast Series

    Featured