Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 126 results for the Publish Year - 2017

Video | October 2017 - Video SEI Cyber Minute: Cadence in Agile Development By Will Hayes

Watch Will Hayes in this Cyber Minute as he discusses using practices like continuous integration and a common code base, which help teams focus on getting the work done.

Technical Report | October 2017 - Technical Report 2017 Emerging Technology Domains Risk Survey By Dan J. Klinedinst, Joel Land, Kyle O'Meara

This report summarizes our understanding of future technologies. It helps US-CERT identify vulnerabilities, promote good security practices, and understand vulnerability risk.

Presentation | October 2017 - Presentation Four Valuable Data Sources for Network Security Analytics By Timothy J. Shimeall

This webinar will focus on the development and application of combined data analytics and will offer several examples of analytics that combine domain resolution data, network device inventory and configuration data.

Technical Report | September 2017 - Technical Report R-EACTR: A Framework for Designing Realistic Cyber ... By Geoffrey B. Dobson, Thomas G. Podnar, Adam D. Cerini, Luke J. Osterritter

Introduces a design framework for cyber warfare exercises. It ensures that in designing team-based exercises, realism is factored into every aspect of the participant experience.

Video | September 2017 - Video SEI Cyber Minute: Cyber Investigator Certificate Program By Larry Rogers

With an ever increasing number of crimes with a cyber component, the need for investigators who have been trained the ways of the Internet, encryption, and social media, to name a few, is growing and will continue to grow.

White Paper | September 2017 - White Paper Architecture Practices for Complex Contexts By John Klein

This doctoral thesis, completed at Vrije Universiteit Amsterdam, focuses on software architecture practices for systems of systems, including data-intensive systems.

Presentation | September 2017 - Presentation Hands-On Tutorial: Auditing Static Analysis Alerts Using a ... By Lori Flynn, David Svoboda, William Snavely

In this tutorial, SEI researchers describe auditing rules and a lexicon that SEI developed.

Technical Note | September 2017 - Technical Note Defining a Progress Metric for CERT-RMM Improvement By Gregory Crabb (United States Postal Service), Nader Mehravari (Axio Global), David Tobar

Describes the Cybersecurity Program Progress Metric and how its implementation in a large, diverse U.S. national organization can serve to indicate progress toward improving cybersecurity and resilience capabilities.

Conference Paper | September 2017 - Conference Paper "SHORT"er Reasoning About Larger Requirements Models By George Mathew (North Carolina State University), Tim Menzies (North Carolina State University), Neil Ernst, John Klein

SHORT is a tool to simplify reasoning about requirements engineering (RE) models by exploiting key decisions within them, evaluated on eight complex RE models.

Video | September 2017 - Video SEI Cyber Minute: Cyber Risk Appetite

So what is risk appetite? It is the amount and type of risk that an organization is willing to accept. In other words, risk appetite specifies value ranges for key performance indicators.

Refine