Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 19 results for the Publish Year - 2012 , Type - White Paper

White Paper | March 2012 - White Paper The Impact of Passive DNS Collection on End-User Privacy By Jonathan Spring, Carly L. Huth

In this paper, the authors discuss whether pDNS allows reconstruction of an end user's DNS behavior and if DNS behavior is personally identifiable information.

White Paper | January 2012 - White Paper Communication Among Incident Responders - A Study By Brett Tjaden, Robert Floodeen

In this paper, the authors describe preliminary results of a study of how effective nine autonomous incident response organizations are.

White Paper | September 2012 - White Paper Building an Incident Management Body of Knowledge By Dave Mundie, Robin Ruefle

In this paper, the authors describe the components of the CERT Incident Management Body of Knowledge (CIMBOK) and how they were constructed.

White Paper | February 2012 - White Paper Deriving Software Security Measures from Information ... By Christopher J. Alberts, Julia H. Allen, Robert W. Stoddard

In this paper, the authors describe an approach for deriving measures of software security from common standard practices for information security.

White Paper | January 2012 - White Paper Passive Detection of Misbehaving Name Servers By Leigh B. Metcalf, Jonathan Spring

In this paper, the authors demonstrate that there are name servers that exhibit IP address flux, a behavior that falls outside the prescribed parameters.

White Paper | March 2012 - White Paper Digital Investigation Workforce Development By Dennis M. Allen

In this paper, the authors describe an approach for deriving measures of software security from well-established and commonly used standard practices.

White Paper | January 2012 - White Paper Modifying Lanchester's Equations for Modeling and ... By Jonathan Spring

In this paper, Jonathan Spring models internet competition on large, decentralized networks using a modification of Lanchester's equations for combat.

White Paper | November 2012 - White Paper Maturity Models 101: A Primer for Applying Maturity Models to ... By Richard A. Caralli, Mark Knight (CGI Group), Austin Montgomery

In this paper, the authors explain the history and evolution of and applications for maturity models.

White Paper | December 2012 - White Paper Chronological Examination of Insider Threat Sabotage ... By William R. Claycomb, Carly L. Huth, Lori Flynn, David McIntire, Todd Lewellen

In this paper, the authors examine 15 cases of insider threat sabotage of IT systems to identify points in the attack time-line.

White Paper | June 2012 - White Paper Security-Specific Bibliography By Carol Dekkers, James McCurley, David Zubrow

In this paper, the authors provide a bibliography of sources related to security.