Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 28 results for the Publish Year - 2008 , Type - White Paper

White Paper | September 2008 - White Paper Existence Plots: A Low-Resolution Time Series for Port ... By Jeff Janies

In this paper, Jeff Janies introduces the existence plot as a visualization and discuss its use in gaining insight into a host's behavior.

White Paper | January 2008 - White Paper Vulnerability Detection in ActiveX Controls through Automated ... By Will Dormann, Daniel Plakosh

In this 2008 paper, the authors explore results of a test of a large number of Active X controls, which provides insight into the current state of ActiveX security.

White Paper | January 2008 - White Paper Assessing Disclosure Risk in Anonymized Datasets By Alexi Kounine (EPFL), Michele Bezzi (ATL)

In this paper, the authors propose a framework for estimating disclosure risk using conditional entropy between the original and the anonymized datasets.

White Paper | September 2008 - White Paper Acquisition Archetypes: Underbidding the Contract

From the Acquisition Support Program, one in a series of short papers on acquisition patterns of failure. Acquisition Archetype: Underbidding the Contract

White Paper | March 2008 - White Paper Improvement Technology Classification and Composition in ... By Patrick Kirwan, Lisa Marino, John Morley, Jeannine Siviy

This paper is the third in a five-part series dedicated to examining problems organizations encounter when operating in multimodel environments and the current process improvement approaches such organizations need to consider.

White Paper | May 2008 - White Paper Management and Education of the Risk of Insider Threat ... By Dawn Cappelli, Akash G. Desai (Information Networking Institute - Carnegie Mellon University), Andrew P. Moore, Timothy J. Shimeall, Elise A. Weaver (Worcester Polytechnic Institute), Bradford J. Willke

In this paper, the authors describe the MERIT insider threat model and simulation results.

White Paper | January 2008 - White Paper On the Anonymization and Deanonymization of NetFlow ... By Michalis Foukarakis (Institute of Computer Science), Demetres Antoniades (Institute of Computer Science), Evangelos P. Markatos (Institute of Computer Science)

In this paper, the authors describe anontool, which allows per-field anonymization up to the NetFlow layer and offers a wide range of primitives to choose from.

White Paper | May 2008 - White Paper Implementation Challenges in a Multimodel Environment By Patrick Kirwan, Lisa Marino, John Morley, Jeannine Siviy

This white paper is the fifth in a five-part series dedicated to examining problems organizations encounter when operating in multimodel environments and the current process improvement approaches such organizations need to consider.

White Paper | May 2008 - White Paper Strategic Technology Selection and Classification in ... By Patrick Kirwan, Lisa Marino, John Morley, Jeannine Siviy

This white paper is the second in a five-part series dedicated to examining problems organizations encounter when operating in multimodel environments and the current process improvement approaches such organizations need to consider.

White Paper | March 2008 - White Paper Process Architecture in a Multimodel Environment By Patrick Kirwan, Lisa Marino, John Morley, Jeannine Siviy

This white paper is the fourth in a five-part series dedicated to examining problems organizations encounter when operating in multimodel environments and the current process improvement approaches such organizations need to consider.