Showing 1 - 10 of 11 results for the Publish Year - 2015 , Type - White Paper
This paper describes the Systems and Software Producibility Collaboration Environment (SPRUCE) project and the resulting recommended practices on five software topics.
This paper identifies steps that organizations can use to enhance their security posture to detect potential insider threats.
In this paper, the authors discuss strategies for successful computer network defense (CND) based on considering the adversaries' responses.
In this paper, David Svoboda provides the findings of a SCALe audit on a codebase.
This paper describes a secure coding analysis of the PolyORB-HI-C runtime system used by C language code output from the Ocarina AADL code generator.
In this paper, the authors describe the potential ways an insider threat program (InTP) could go wrong and to engage the community to discuss its concerns.
This paper describes the SEI research and solutions that help organizations gain justified confidence in their cybersecurity posture.
In this paper the authors discuss the number of ECUs and software in modern vehicles and the need for cybersecurity to include vehicles.
In this paper, CERT researchers comment on the proposed rule, Wassenaar Arrangement 2013 Plenary Agreements Implementation: Intrusion and Surveillance Items.
This white paper compares the contents of 85 different Internet blacklists to discover patterns in shared entries.