Advanced Search

Content Type

Topics

Publication Date

New This Month

  • Introduction to Information Security: A Strategic-Based Approach April 2014 - Book The authors provide a strategy-based introduction to providing defenses as a basis for engineering and risk-management decisions in the defense of information.
  • Modeling Malicious Domain Name Take-Down Dynamics: Why eCrime Pays April 2014 - Conference Paper In this paper, Jonathan Spring derives an ad-hoc model of the competition for domain names by criminals and defenders using a modification of Lanchester’s equations for combat.
  • Advanced Mobile Systems Initiative April 2014 - Brochure This brochure describes how the AMS initiative supports the mobile communication and mobile-computing needs of edge users.
  • Towards Quantitative Metrics for Architecture Models April 2014 - Presentation This presentation was part of the First International Workshop on Software Architecture Metrics, held at the 11th Working IEEE/IFIP Conference on Software Architecture.
  • On the Challenges in Extracting Metrics from Java Bytecode April 2014 - Presentation This presentation was part of the First International Workshop on Software Architecture Metrics, held at the 11th Working IEEE/IFIP Conference on Software Architecture.
  • Empirical Evaluation of the Understandability of Architectural Component Diagrams April 2014 - Presentation This presentation was part of the First International Workshop on Software Architecture Metrics, held at the 11th Working IEEE/IFIP Conference on Software Architecture.
  • Industry Perspectives on Requirements for and Value of Software Architecture Metrics April 2014 - Presentation This presentation was part of the First International Workshop on Software Architecture Metrics, held at the 11th Working IEEE/IFIP Conference on Software Architecture.
  • Welcome to SAM 2014 April 2014 - Presentation This presentation was part of the First International Workshop on Software Architecture Metrics, held at the 11th Working IEEE/IFIP Conference on Software Architecture.
  • March 2014

    February 2014

    • Maximizing Trust in the Wireless Emergency Alerts (WEA) Service February 2014 - Special Report This report presents recommendations for stakeholders of the Wireless Emergency Alerts (WEA) service that resulted from the development of two trust models, focusing on how to increase both alert originators’ and the public’s trust in WEA.
    • Wireless Emergency Alerts: Trust Model Simulations February 2014 - Special Report This report presents four types of simulations run on the public trust model and the alert originator trust model developed for the Wireless Emergency Alerts (WEA) service, focusing on how to increase both alert originators’ and the public’s trust in WEA.
    • Wireless Emergency Alerts: Trust Model Technical Report February 2014 - Special Report This report describes a trust model to enable the Federal Emergency Management Agency to maximize the effectiveness of the Wireless Emergency Alerts (WEA) service and provides guidance for alert originators in using WEA to maximize public safety.
    • Commercial Mobile Alert Service (CMAS) Scenarios February 2014 - Special Report This report provides operational and development mission threads to help emergency alert originators analyze scenarios that will aid them in adopting and integrating the Commercial Mobile Alert Service (CMAS) into their emergency management systems.
    • Commercial Mobile Alert Service (CMAS) Alerting Pipeline Taxonomy February 2014 - Technical Report This report presents the Commercial Mobile Alert Service (CMAS) Alerting Pipeline Taxonomy, a hierarchical classification that encompasses four elements of the alerting pipeline, to help stakeholders understand and reason about required CMAS operations.
    • Wireless Emergency Alerts: New York City Demonstration February 2014 - Special Report This report describes the adoption of the Wireless Emergency Alerts (WEA) service by the New York City Office of Emergency Management. As the first alert originator to adopt WEA, its experiences provide lessons learned for other emergency managers.
    • Best Practices in Wireless Emergency Alerts February 2014 - Special Report This report presents four best practices for the Wireless Emergency Alerts (WEA) service, including implementing WEA in a local jurisdiction, training emergency staff in using WEA, cross-jurisdictional governance of WEA, and cybersecurity risk management.
    • Study of Integration Strategy Considerations for Wireless Emergency Alerts February 2014 - Special Report This report identifies key challenges and offers recommendations for alert originators navigating the process of adopting and integrating the Wireless Emergency Alerts (WEA) service into their emergency management systems.
    • The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) February 2014 - Podcast ES-C2M2 helps improve the operational resilience of the U.S. power grid.
    • Software Assurance for Executives Definitions February 2014 - Educational Material In this document, the authors provide definitions of terms used in the Software Assurance for Executives Course.
    • Software Assurance for Executives Acronyms February 2014 - Educational Material This document defines the acronyms used in the Software Assurance for Executives course.
    • Software Assurance for Executives Bibliography February 2014 - Educational Material This bibliography provides sources of information used to develop the Software Assurance for Executives Course.
    • Results in Relating Quality Attributes to Acquisition Strategies February 2014 - Technical Note This technical note describes the second phase of a study that focuses on the relationships between software architecture and acquisition strategy -- more specifically, their alignment or misalignment.

    January 2014

    WebinarSeries092013
    SEI Podcast Series

    Featured