Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 31 - 40 of 491 results for the Type - White Paper

White Paper | May 2013 - White Paper Strengths in Security Solutions By Arjuna Shunn (Microsoft), Carol Woody, Robert C. Seacord, Allen D. Householder

In this white paper, the authors map eight CERT tools, services, and processes to Microsoft's Simplified Security Development Lifecycle.

White Paper | October 2001 - White Paper 2001 Tech Tip: Managing the Threat of Denial-of-Service ... By Allen D. Householder, Art Manion, Linda Pesante

In this 2001 paper, the authors describe the then-current situation regarding denial-of-service (DOS) attacks and ways of addressing the problem.

White Paper | January 2017 - White Paper SQUARE Frequently Asked Questions (FAQ)

This paper contains information about SQUARE, a process that helps organizations build security into the early stages of the software production lifecycle.

White Paper | April 2011 - White Paper Principles of Survivability and Information Assurance

In this paper, the authors describe a Security Information and Event Management signature for detecting possible malicious insider activity.

White Paper | April 2009 - White Paper Assurance Cases for Design Analysis of Complex System of ... By Stephen Blanchette - Jr.

This paper discusses the application of assurance cases as a means of building confidence that the software design of a complex system of systems will actually meet the operational objectives set forth in the project's top-level requirements.

White Paper | March 2012 - White Paper The Impact of Passive DNS Collection on End-User Privacy By Jonathan Spring, Carly L. Huth

In this paper, the authors discuss whether pDNS allows reconstruction of an end user's DNS behavior and if DNS behavior is personally identifiable information.

White Paper | May 2013 - White Paper Foundations for Software Assurance By Carol Woody, Dan Shoemaker (University of Detroit Mercy), Nancy R. Mead

In this paper, the authors highlight efforts underway to address our society's growing dependence on software and the need for effective software assurance.

White Paper | May 2017 - White Paper IEEE Computer Society/Software Engineering Institute Watts S ...

IEEE Computer Society/Software Engineering Institute Watts S. Humphrey Software Process Achievement Award

White Paper | November 2013 - White Paper Agile Security - Review of Current Research and Pilot Usage By Carol Woody

This white paper was produced to focus attention on the opportunities and challenges for embedding information assurance considerations into Agile development and acquisition.

White Paper | October 2015 - White Paper Effective Insider Threat Programs: Understanding and ... By Andrew P. Moore, William E. Novak, Matthew L. Collins, Randall F. Trzeciak, Michael C. Theis

In this paper, the authors describe the potential ways an insider threat program (InTP) could go wrong and to engage the community to discuss its concerns.

Refine