Showing 1 - 7 of 7 results for the Science of Cybersecurity
This report describes individual and team factors that enable, encumber, or halt the development of malicious-code reverse engineering expertise.
During this webinar, Dr. Shannon examined the questions, science, and technology that builds trust with customers, other organizations, and society to ensure their security and privacy, and our own resilience and accountability.
This report provides brief abstracts for major research projects, followed by more detailed descriptions of these projects, for all CERT research conducted in the year 2003.
The SEI is researching how measurement can be used to establish confidence in software security. This presentation shares our progress to date.
In this report, the CERT Insider Threat team examines unintentional insider threat (UIT), a largely unrecognized problem.
In this article, the authors describe the benefits of applying the mechanistic approach in philosophy of science to experimentation in computing.
In this poster, a CERT Threat Detection Project is illustrated, including the problem, goals, approach, and data collection methods.