Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 20 results for Science of Cybersecurity

Brochure | November 2017 - Brochure CERT Cybersecurity Training & Education Catalog

This catalog summarizes the cybersecurity courses and certificates offered by the CERT Division of the SEI.

Brochure | June 2016 - Brochure Big Data: Learn to Reap the Benefits

Leverage the experience and connections of the CERT Science of Cybersecurity Team to achieve your data analysis goals.

Brochure | February 2016 - Brochure It's Time to Engage with the CERT Division

Learn how the CERT Division can help you keep pace with cybersecurity challenges.

CERT Research Report | September 2011 - CERT Research Report 2010 CERT Research Report

In this 2010 report, the authors highlight CERT Division accomplishments and activities in successfully executing its research strategy.

CERT Research Report | January 2007 - CERT Research Report 2007 CERT Research Report

In this 2007 report, the authors describe how CERT research advanced the field of information and systems security during the 2007 fiscal year.

Annual Report | July 2006 - Annual Report CERT Research 2005 Annual Report

This report provides brief abstracts for major research projects, followed by more detailed descriptions of these projects, for all CERT research conducted in the year 2005.

Technical Report | June 2014 - Technical Report Job Analysis Results for Malicious-Code Reverse Engineers ... By Jennifer Cowley

This report describes individual and team factors that enable, encumber, or halt the development of malicious-code reverse engineering expertise.

White Paper | August 2018 - White Paper Threat Modeling: A Summary of Available Methods By Nataliya Shevchenko, Timothy A. Chick, Paige O'Riordan, Tom Scanlon, Carol Woody - PhD

This paper discusses twelve threat modeling methods from a variety of sources that target different parts of the development process.

CERT Research Report | January 2006 - CERT Research Report 2006 CERT Research Report

In this 2006 report, the authors describe how CERT research advanced the field of information and system security during the 2006 fiscal year.

CERT Research Report | January 2008 - CERT Research Report 2008 CERT Research Report

In this 2008 report, the authors describe how CERT research advanced the field of information and systems security during the 2008 fiscal year.