Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 11 results for the Author - carnegie mellon university) , Type - White Paper

White Paper | June 2011 - White Paper An Online Learning Approach to Information Systems Security ... By Norman Bier (Carnegie Mellon University), Marsha Lovett (Carnegie Mellon University), Robert C. Seacord

In this paper, the authors describe the development of a secure coding module that shows how to capture content, ensure learning, and scale to meet demand.

White Paper | May 2008 - White Paper Management and Education of the Risk of Insider Threat ... By Dawn Cappelli, Akash G. Desai (Information Networking Institute - Carnegie Mellon University), Andrew P. Moore, Timothy J. Shimeall, Elise A. Weaver (Worcester Polytechnic Institute), Bradford J. Willke

In this paper, the authors describe the MERIT insider threat model and simulation results.

White Paper | July 2009 - White Paper Insider Theft of Intellectual Property for Business Advantage: A ... By Andrew P. Moore, Dawn Cappelli, Thomas C. Caron (John Heinz III College - School of Information Systems Management, Carnegie Mellon University), Eric D. Shaw, Randall F. Trzeciak

In this paper, the authors describe general observations about, and a preliminary system dynamics model of, insider crime based on our empirical data.

White Paper | December 2013 - White Paper Spotlight On: Programmers as Malicious Insiders–Updated ... By Matthew L. Collins, Dawn Cappelli, Thomas C. Caron (John Heinz III College - School of Information Systems Management, Carnegie Mellon University), Randall F. Trzeciak, Andrew P. Moore

In this paper, the authors describe the who, what, when, where, and how of attacks by insiders using programming techniques and includes case examples.

White Paper | August 2009 - White Paper Effectiveness of the Vulnerability Response Decision ... By Art Manion, Kazuya Togashi (JPCERT/CC), Joseph B. Kadane (Department of Statistics - Carnegie Mellon University), Fumihiko Kousaka (JPCERT/CC), Shawn McCaffrey (Carnegie Mellon University), Christopher King, Masanori Yamaguchi (IIJ Technology Inc.), Robert Weiland (Carnegie Mellon University)

In this paper, the authors describe the Vulnerability Response Decision Assistance (VRDA) framework, a decision support and expert system.

White Paper | February 2010 - White Paper Instrumented Fuzz Testing Using AIR Integers (Whitepaper) By Roger Dannenberg (School of Computer Science - Carnegie Mellon University), Will Dormann, David Keaton, Robert C. Seacord, Timothy Wilson, Thomas Plum (Plum Hall - Inc.)

In this paper, the authors present the as-if infinitely ranged (AIR) integer model, which provides a mechanism for eliminating integral exceptional conditions.

White Paper | October 2012 - White Paper Spotlight On: Insider Threat from Trusted Business Partners ... By Todd Lewellen, Andrew P. Moore, Dawn Cappelli, Randall F. Trzeciak, Derrick Spooner, Robert Weiland (Carnegie Mellon University)

In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization.

White Paper | July 2004 - White Paper Statistical Methods for Flow Data By Joseph B. Kadane (Department of Statistics - Carnegie Mellon University)

In this presentation, Joseph B. Kadane discusses how Bayesian methods help make the logistic regression approach to scan data stable and operationally feasible.

White Paper | December 2008 - White Paper Spotlight On: Programming Techniques Used as an Insider ... By Dawn Cappelli, Thomas C. Caron (John Heinz III College - School of Information Systems Management, Carnegie Mellon University), Randall F. Trzeciak, Andrew P. Moore

In this report, the authors focus on persons who use programming techniques to commit malicious acts against their organizations.

White Paper | May 2014 - White Paper Precise Static Analysis of Taint Flow for Android Application ... By Amar S. Bhosale (No Affiliation)

This thesis describes a static taint analysis for Android that combines the FlowDroid and Epicc analyses to track inter- and intra-component data flow.