Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type


Publication Date

Showing 1 - 10 of 22 results for the Digital Intelligence and Investigation

White Paper | March 2012 - White Paper Digital Investigation Workforce Development By Dennis M. Allen

In this paper, the authors describe an approach for deriving measures of software security from well-established and commonly used standard practices.

Brochure | January 2017 - Brochure Software Solutions Symposium 2017 - Informational Brochure

The Software Solutions Symposium is a forum for learning about emerging technologies and practical solutions that you can apply today for help with systemic software issues such as assurance, cost, and schedule. March 20-23, 2017. Arlington, VA

Brochure | February 2016 - Brochure CERT Cybersecurity Training & Education Catalog

This catalog summarizes the cybersecurity courses and certificates offered by the CERT Division of the SEI.

Brochure | February 2016 - Brochure It's Time to Engage with the CERT Division

Learn how the CERT Division can help you keep pace with cybersecurity challenges.

Poster | March 2014 - Poster Cyber Engineering Solutions Group: How We Create ... By Barbora Batokova, Hasan Yasar

With the increasing number of projects and the expansion of our team, we needed to capture our internal process and expertise so that we could effectively communicate our approach to new team members, the larger organization and our customers.

CERT Research Report | September 2011 - CERT Research Report 2010 CERT Research Report

In this 2010 report, the authors highlight CERT Division 2010 accomplishments and activities in successfully executing its research strategy.

Conference Paper | October 2014 - Conference Paper Design Research in the Context of Federal Law Enforcement By Barbora Batokova, Todd Waits, Anne Connell

In this paper, the authors discuss the design research methods used to develop a hardware and software solution for paper-based evidence processing.

Technical Note | March 2013 - Technical Note Detecting and Preventing Data Exfiltration Through Encrypted ... By George Silowash, Todd Lewellen, Joshua W. Burns, Daniel L. Costa

In this report, the authors present methods for detecting and preventing data exfiltration using a Linux-based proxy server in a Microsoft Windows environment.

Technical Note | August 2008 - Technical Note Computer Forensics: Results of Live Response Inquiry vs. ... By Cal Waits, Joseph A. Akinyele, Richard Nolan, Larry Rogers

In this 2008 report, the authors compare various approaches and tools used to capture and analyze evidence from computer memory.

Handbook | September 2005 - Handbook First Responders Guide to Computer Forensics: Advanced ... By Richard Nolan, Marie Baker, Jake Branson, Josh Hammerstein, Kristopher Rush, Cal Waits, Elizabeth Schweinsberg

In this 2005 handbook, the authors help technical staff members who are charged with administering and securing information systems and networks.