The SEI Digital Library provides access to more than 3,500 documents from three decades of research into best practices in software engineering. These documents include technical reports, presentations, webinars, podcasts and other materials searchable by user-supplied keywords and organized by topic, publication type, publication year, and author.
This paper was accepted by the SQUADE workshop at ICSE 2018. It describes the development of several classification models for the prioritization of alerts produced by static analysis tools and how those models were tested for accuracy.
This paper discusses twelve threat modeling methods from a variety of sources that target different parts of the development process.
Mike Konrad and Bob Stoddard discuss an approach known as causal learning that can help the Department of Defense identify which factors cause software costs to escalate and, therefore, serve as a better basis for guidance on how to intervene.
Carol Woody discusses opportunities and risks in cybersecurity engineering, software assurance, and the resulting CERT Cybersecurity Engineering and Software Assurance Professional Certificate.
What is the best way to ensure architectural security considerations are implemented and tested during application development? Watch this SEI Cyber Minute to find out.
Mike Phillips and Harry Levinson examine the intersection of three themes that emerged during the SEI’s work with one government program: product line practices, software sustainment, and public-private partnerships.
With the recent Cambridge Analytica news and the rollout of the General Data Privacy Rule (GDPR) in Europe, there are many questions about how social media data privacy is managed and how it could be managed.
In this first webcast in a two-part series, April Galyardt and Carson Sestili described what metadata is and what information can be gleaned from it.
In this webcast, we explain how the technology works and what makes it fundamentally different than its predecessors. We discuss where it fits (and where it doesn’t fit) and help set a rubric to help you determine if you need this technology.