Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 488 results for the Type - White Paper

White Paper | August 2018 - White Paper Threat Modeling: A Summary of Available Methods By Nataliya Shevchenko, Timothy A. Chick, Paige O'Riordan, Tom Scanlon, Carol Woody - PhD

This paper discusses twelve threat modeling methods from a variety of sources that target different parts of the development process.

White Paper | December 2018 - White Paper Towards Improving CVSS By Jonathan Spring, Eric Hatleback, Allen D. Householder, Art Manion, Deana Shick

This paper outlines challenges with the Common Vulnerability Scoring System (CVSS).

White Paper | January 1994 - White Paper White Papers

A list of all white papers in the SEI library in descending order by publication date.

White Paper | September 2018 - White Paper Threat Modeling for Cyber-Physical System-of-Systems ... By Nataliya Shevchenko, Brent Frye, Carol Woody - PhD

This paper compares threat modeling methods for cyber-physical systems and recommends which methods (and combinations of methods) to use.

White Paper | October 2006 - White Paper Scalable Flow Analysis (White Paper) By Abhishek Kumar (University of Maryland), Sapan Bhatia (Princeton)

In this paper, the authors present a new approach for summarization and analysis of flow records.

White Paper | May 2010 - White Paper The Illusion of Certainty - Paper By Grady Campbell

In this 2010 paper, Grady Campbell - delivered at the 7th Acquisition Research Symposium - argues that a new approach to acquisition is needed that recognizes that hiding uncertainty is detrimental to success.

White Paper | April 2015 - White Paper SCALe Analysis of JasPer Codebase By David Svoboda

In this paper, David Svoboda provides the findings of a SCALe audit on a codebase.

White Paper | July 2018 - White Paper Navigating the Insider Threat Tool Landscape: Low-Cost ... By Derrick Spooner, George Silowash, Daniel L. Costa, Michael J. Albrethsen

This paper explores low cost technical solutions that can help organizations prevent, detect, and respond to insider incidents.

White Paper | May 2013 - White Paper Software Security Engineering: A Guide for Project Managers ... By Gary McGraw, Julia H. Allen, Nancy R. Mead, Robert J. Ellison, Sean Barnum

In this guide, the authors discuss our reliance on software and systems that use the internet or internet-exposed private networks.

White Paper | October 2006 - White Paper IPFIX/PSAMP: What Future Standards Can Offer to Network ... By Tanja Zseby (Fraunhofer Fokus), Elisa Boschi (Hitachi), Thomas Hirsch (Fraunhofer Fokus), Mark Lutz (Fraunhofer Fokus)

In this paper, the authors show how IPFIX and PSAMP can be used to support network security.

Refine