Showing 1 - 10 of 488 results for the Type - White Paper
This paper discusses twelve threat modeling methods from a variety of sources that target different parts of the development process.
This paper outlines challenges with the Common Vulnerability Scoring System (CVSS).
A list of all white papers in the SEI library in descending order by publication date.
This paper compares threat modeling methods for cyber-physical systems and recommends which methods (and combinations of methods) to use.
In this paper, the authors present a new approach for summarization and analysis of flow records.
In this 2010 paper, Grady Campbell - delivered at the 7th Acquisition Research Symposium - argues that a new approach to acquisition is needed that recognizes that hiding uncertainty is detrimental to success.
In this paper, David Svoboda provides the findings of a SCALe audit on a codebase.
This paper explores low cost technical solutions that can help organizations prevent, detect, and respond to insider incidents.
In this guide, the authors discuss our reliance on software and systems that use the internet or internet-exposed private networks.
In this paper, the authors show how IPFIX and PSAMP can be used to support network security.