Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 175 results for the Type - Special Report

Special Report | July 2017 - Special Report Systemic Vulnerabilities in Customer-Premises Equipment ... By Joel Land

This report describes a test framework that the CERT/CC developed to identify systemic and other vulnerabilities in CPE routers.

Special Report | January 2017 - Special Report A Technical History of the SEI By Larry Druffel

This report chronicles the technical accomplishments of the Software Engineering Institute and its impact on the Department of Defense software community, as well as on the broader software engineering community.

Special Report | December 2016 - Special Report RFP Patterns and Techniques for Successful Agile ... By Mary Ann Lapham, Larri Ann Rosser (Raytheon Intelligence Information and Services), Steven Martin (Space and Missile Systems Center), Thomas E. Friend (Agile On Target), Peter Capell, Keith Korzec, Greg Howard (MITRE), Michael Ryan (BTAS), John H. Norton III (Raytheon Integrated Defense Systems)

This report discusses request-for-proposal patterns and techniques for successfully contracting a federal Agile project.

Special Report | June 2016 - Special Report Wireless Emergency Alerts Commercial Mobile Service ... By Christopher J. Alberts, Audrey J. Dorofee, Carol Woody - PhD

This report provides members of the Commercial Mobile Service Provider (CMSP) community with practical guidance for better managing cybersecurity risk exposure, based on an SEI study of the CMSP element of the Wireless Emergency Alert pipeline.

Special Report | June 2016 - Special Report Report Writer and Security Requirements Finder: User and ... By Nancy R. Mead, Anand Sankalp (Carnegie Mellon University), Gupta Anurag (Carnegie Mellon), Priyam Swati (Carnegie Mellon University), Yaobin Wen (Carnegie Mellon University), Walid El Baroni (Carnegie Mellon University)

This report presents instructions for using the Malware-driven Overlooked Requirements (MORE) website applications.

Special Report | December 2015 - Special Report Architecture-Led Safety Analysis of the Joint Multi-Role (JMR) ... By Peter H. Feiler

This report summarizes an architecture-led safety analysis of the aircraft-survivability situation-awareness system for the Joint Multi-Role vertical lift program.

Special Report | December 2015 - Special Report Requirements and Architecture Specification of the Joint Multi ... By Peter H. Feiler

This report describes a method for capturing information from requirements documents in AADL and the draft Requirement Definition & Analysis Language Annex.

Special Report | December 2015 - Special Report Potential System Integration Issues in the Joint Multi-Role ... By Peter H. Feiler, John J. Hudak

This report describes a method for capturing information from requirements documents in AADL to identify potential integration problems early in system development.

Special Report | December 2015 - Special Report Intelligence Preparation for Operational Resilience (IPOR) By Douglas Gray

The author describes Intelligence Preparation for Operational Resilience (IPOR), a framework for preparing intelligence that complements commonly used intelligence frameworks such as Intelligence Preparation of the Battlefield (IPB).

Special Report | November 2015 - Special Report Cyber + Culture Early Warning Study By Char Sample

This study was designed to profile cyber actors, and to examine the time interval between cyber and kinetic events in order to gain greater insights into nation-state cyber responses to kinetic events.

Refine