Showing 1 - 10 of 176 results for the Type - Special Report
This report presents instructions for using the Malware-driven Overlooked Requirements (MORE) website applications.
The author describes Intelligence Preparation for Operational Resilience (IPOR), a framework for preparing intelligence that complements commonly used intelligence frameworks such as Intelligence Preparation of the Battlefield (IPB).
This report describes a test framework that the CERT/CC developed to identify systemic and other vulnerabilities in CPE routers.
This report describes a trust model to enable the Federal Emergency Management Agency to maximize the effectiveness of the Wireless Emergency Alerts (WEA) service and provides guidance for alert originators in using WEA to maximize public safety.
This report presents a summary of the findings of the Socio-Adaptive Systems Challenge Problem Workshop, held in Pittsburgh, PA, on April 12-13, 2012.
This report summarizes the results of a survey that had the goal of quantifying the connection between the application of systems engineering (SE) best practices to projects and programs and the performance of those projects and programs.
This report discusses request-for-proposal patterns and techniques for successfully contracting a federal Agile project.
This 1997 report identifies threats to and vulnerabilities of the Internet and estimates the cascade effect that a successful, sustained attack on the Internet would have on the critical national infrastructures set out in Executive Order 13010.
This report summarizes the CSE/SEI February 2000 SDM workshop and presents its recommendations.
This report summarizes the results of the CMMI Workshop held May 7-8, 2002.