Showing 1 - 10 of 66 results for the Type - Article
This paper discusses two related efforts to provide guidance about improving professional software engineering through graduate education.
In this Crosstalk article, the authors discuss the growing challenge of cyber risks in the defense supply chain.
This article lists resources that developers, architects, and security practitioners can use to build security into software during its development.
The article discusses what can (and should) be done to improve the state of software engineering on large scale aerospace programs.
In this paper, the authors describe the modeling of the potential of an organization to develop an insider threat given certain attributes of its culture.
In this paper, the authors describe the results of using their network model to simulate the flow of sensitive information in organizations.
In this publication, the authors introduce the area of insider threat modeling and simulation generally, and discuss the range of methods used in the research papers of the Special Issue.
In this paper, the authors analyze how the dynamics of compliance games illuminate the effectiveness or risks of an organizational policy.
In this paper, the authors present a system dynamics model that incorporates psychological factors to simulate the pathway to insider attack.
In this teQ Magazine article, Greg Porter discusses the role technology plays in solving today's cybersecurity challenges.