Showing 1 - 10 of 179 results for the Type - Special Report
The Army Cyber Institute hosted a Cyber Mutual Assistance Workshop to identify challenges in defining cyber requirements for Regional Mutual Assistance Groups.
This report presents instructions for using the Malware-driven Overlooked Requirements (MORE) website applications.
This report describes a trust model to enable the Federal Emergency Management Agency to maximize the effectiveness of the Wireless Emergency Alerts (WEA) service and provides guidance for alert originators in using WEA to maximize public safety.
This report presents a summary of the findings of the Socio-Adaptive Systems Challenge Problem Workshop, held in Pittsburgh, PA, on April 12-13, 2012.
This report summarizes the results of the CMMI Workshop held May 7-8, 2002.
The SEI collected data to learn more about how CMMI is being accepted by various organizations. This report describes those activities and includes summaries of the data collected.
This 1997 report identifies threats to and vulnerabilities of the Internet and estimates the cascade effect that a successful, sustained attack on the Internet would have on the critical national infrastructures set out in Executive Order 13010.
This 1997 report describes the STEP '97 conference, overviews the Net-Centric Computing workshop, and provides a summary of the invited presentations.
In this report, Carol Sledge explains why the annual Regional Information Assurance Symposia is a key transition component of Regional Collaborative Clusters.
This 1996 report summarizes five pilot appraisals performed from the third quarter of 1995 through the first quarter of 1996 using the Software Acquisition Capability Maturity Model (SA-CMM).