Showing 1 - 10 of 19 results for the Publish Year - 2016 , Type - White Paper
This paper examines the current state of cybercrime and explores how organizations and individuals respond to cybercrime threats.
he goal of this paper is to present a solution for establishing trusted identities in disconnected environments based on secure key generation and exchange in the field.
In this paper, the authors describe their analysis of two case studies to outline the relationship between adversaries and network defenders.
This paper reviews the issue of cyber awareness and identify efforts to combat this deficiency and concludes with strategies moving forward.
Ultra-large-scale systems are interdependent webs of software, people, policies, and economics. In socio-adaptive systems, human and software interact as peers.
Pervasive mobile computing focuses on how soldiers and first responders can use smartphones, tablets, and other mobile/wearable devices at the tactical edge.
Predictability by construction (PBC) makes the behavior of a component-based system predictable before implementation, based on known properties of components.
This white paper, which is the latest in a series of regular updates, builds upon the analysis of blacklists presented in our 2013 and 2014 reports.
This document contains the relerase notes for CERT-RMM Version 1.2, released February 2014.
Cyber-physical systems (CPS) integrate computational algorithms and physical components. SEI promotes efficient development of high-confidence, distributed CPS.