Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type


Publication Date

Showing 21 - 30 of 488 results for the Type - White Paper

White Paper | January 2017 - White Paper Create a CSIRT

This white paper discusses the issues and decisions organizations should address when planning, implementing, and building a CSIRT.

White Paper | September 2005 - White Paper Covert Channel Detection Using Process Query Systems ... By Vincent Berk (Dartmouth College)

In this FloCon 2005 presentation, the author uses traffic analysis to investigate a stealthy form of data exfiltration.

White Paper | June 2017 - White Paper The Hard Choices Game Explained By Nanette Brown, Philippe Kruchten, Erin Lim, Robert Nord, Ipek Ozkaya

The Hard Choices game is a simulation of the software development cycle meant to communicate the concepts of uncertainty, risk, and technical debt.

White Paper | March 2015 - White Paper SEI SPRUCE Project: Curating Recommended Practices for ... By Michael D. Konrad, B. Craig Meyers, Tamara Marshall-Keim, Gerald W. Miller, Bill Pollak

This paper describes the Systems and Software Producibility Collaboration Environment (SPRUCE) project and the resulting recommended practices on five software topics.

White Paper | May 2016 - White Paper 2016 State of Cybercrime Survey

This paper examines the current state of cybercrime and explores how organizations and individuals respond to cybercrime threats.

White Paper | December 2013 - White Paper Spotlight On: Programmers as Malicious Insiders–Updated ... By Matthew L. Collins, Dawn Cappelli, Thomas C. Caron (John Heinz III College - School of Information Systems Management, Carnegie Mellon University), Randall F. Trzeciak, Andrew P. Moore

In this paper, the authors describe the who, what, when, where, and how of attacks by insiders using programming techniques and includes case examples.

White Paper | December 2015 - White Paper Analytic Approaches to Detect Insider Threats

This paper identifies steps that organizations can use to enhance their security posture to detect potential insider threats.

White Paper | November 2016 - White Paper Seven Proposal-Writing Tips That Make Conference Program ... By Bill Pollak

Writing a great session proposal for a conference is difficult. Here are seven tips for writing a session proposal that will make reviewers go from frown to smile.

White Paper | October 2016 - White Paper Establishing Trusted Identities in Disconnected Edge ... By Sebastián Echeverría (Universidad de los Andes), Dan J. Klinedinst, Keegan M. Williams

he goal of this paper is to present a solution for establishing trusted identities in disconnected environments based on secure key generation and exchange in the field.

White Paper | March 2013 - White Paper Identifying a Shared Mental Model Among Incident ... By Robert Floodeen, John Haller, Brett Tjaden

In this paper, the authors explore how effective communication might be improved by the development of a mental model internalized by the group's technical staff prior to an incident.