Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 634 results for the Type - Technical Report

Technical Report | December 2016 - Technical Report Architecture-Led Safety Process By Peter H. Feiler, Julien Delange, David P. Gluch, John McGregor

Architecture-Led Safety Analysis (ALSA) is a safety analysis method that uses early architecture knowledge to supplement traditional safety analysis techniques to identify faults as early as possible.

Technical Report | December 2016 - Technical Report Common Sense Guide to Mitigating Insider Threats, 5th ... By Matthew L. Collins, Michael C. Theis, Randall F. Trzeciak, Jeremy R. Strozer, Jason W. Clark, Daniel L. Costa, Tracy Cassidy, Michael J. Albrethsen, Andrew P. Moore

Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.

Technical Report | December 2016 - Technical Report The Critical Role of Positive Incentives for Reducing Insider ... By Andrew P. Moore, Jeff Savinda, Elizabeth A. Monaco, Jamie L. Moyes, Denise M. Rousseau (Carnegie Mellon University), Samuel J. Perl, Jennifer Cowley, Matthew L. Collins, Tracy Cassidy, Nathan VanHoudnos, Palma Buttles-Valdez, Daniel Bauer, Allison Parshall

This report describes how positive incentives complement traditional practices to provide a better balance for organizations‰ insider threat programs.

Technical Report | October 2016 - Technical Report Definition and Measurement of Complexity in the Context of ... By Sarah Sheard, Michael D. Konrad, Charles B. Weinstock, William Nichols

This report describes research to define complexity measures for avionics systems to help the FAA identify when systems are too complex to assure their safety.

Technical Report | August 2016 - Technical Report Segment-Fixed Priority Scheduling for Self-Suspending Real ... By Junsung Kim, Björn Andersson (Carnegie Mellon University), Dionisio de Niz, Ragunathan (Raj) Rajkumar, Jian-Jia Chen, Wen-Hung Huang, Geoffrey Nelissen

This report describes schedulability analyses and proposes segment-fixed priority scheduling for self-suspending tasks.

Technical Report | June 2016 - Technical Report Architecture Fault Modeling and Analysis with the Error Model ... By Peter H. Feiler, John J. Hudak, Julien Delange, David P. Gluch

This report describes the Error Model Annex, Version 2 (EMV2), notation for architecture fault modeling, which supports safety, reliability, and security analyses.

Technical Report | June 2016 - Technical Report A Requirement Specification Language for AADL By Peter H. Feiler, Julien Delange, Lutz Wrage

This report describes a textual requirement specification language, called ReqSpec, for the Architecture Analysis & Design Language (AADL) and demonstrates its use.

Technical Report | June 2016 - Technical Report DMPL: Programming and Verifying Distributed Mixed ... By Sagar Chaki, David Kyle

DMPL is a language for programming distributed real-time, mixed-criticality software. It supports distributed systems in which each node executes a set of periodic real-time threads that are scheduled by priority and criticality.

Technical Report | May 2016 - Technical Report An Insider Threat Indicator Ontology By Daniel L. Costa, Michael J. Albrethsen, Matthew L. Collins, Samuel J. Perl, George Silowash, Derrick Spooner

This report presents an ontology for insider threat indicators, describes how the ontology was developed, and outlines the process by which it was validated.

Technical Report | May 2016 - Technical Report Using Honeynets and the Diamond Model for ICS Threat ... By John Kotheimer, Kyle O'Meara, Deana Shick

This report presents an approach to analyzing approximately 16 gigabytes of full packet capture data collected from an industrial control system honeynet,a network of seemingly vulnerable machines designed to lure attackers.

Refine