Showing 1 - 10 of 176 results for the Type - Special Report
This report presents instructions for using the Malware-driven Overlooked Requirements (MORE) website applications.
This report describes a trust model to enable the Federal Emergency Management Agency to maximize the effectiveness of the Wireless Emergency Alerts (WEA) service and provides guidance for alert originators in using WEA to maximize public safety.
This report presents a summary of the findings of the Socio-Adaptive Systems Challenge Problem Workshop, held in Pittsburgh, PA, on April 12-13, 2012.
This report summarizes the CSE/SEI February 2000 SDM workshop and presents its recommendations.
This report describes a test framework that the CERT/CC developed to identify systemic and other vulnerabilities in CPE routers.
This 1997 report identifies threats to and vulnerabilities of the Internet and estimates the cascade effect that a successful, sustained attack on the Internet would have on the critical national infrastructures set out in Executive Order 13010.
This report summarizes the results of the CMMI Workshop held May 7-8, 2002.
The SEI collected data to learn more about how CMMI is being accepted by various organizations. This report describes those activities and includes summaries of the data collected.
This report discusses request-for-proposal patterns and techniques for successfully contracting a federal Agile project.
In this report, Carol Sledge explains why the annual Regional Information Assurance Symposia is a key transition component of Regional Collaborative Clusters.