Showing 1 - 10 of 68 results for the cybersecurity engineering Type - White Paper
In this guide, the authors discuss our reliance on software and systems that use the internet or internet-exposed private networks.
In this paper, Nancy Mead describes a measurement approach to security requirements engineering to analyze projects that were developed with and without SQUARE.
In this paper, the authors detail the validation of a teaching model for security requirements engineering that ensures that security is built into software.
In this paper, Nancy Mead provides a bibliography of sources related to requirements engineering.
In this paper, Nancy Mead adapts the SQUARE process for security requirements engineering to different acquisition situations.
In this paper, the authors provide a bibliography of sources related to software engineering.
In this paper, Nancy Mead how a systematic approach to security requirements engineering helps to avoid problems.
This paper discusses twelve threat modeling methods from a variety of sources that target different parts of the development process.
This paper describes a secure coding analysis of the PolyORB-HI-C runtime system used by C language code output from the Ocarina AADL code generator.
In this paper, the authors describe three educational initiatives in support of software assurance education.