Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 86 results for the Vulnerability Analysis

Technical Report | May 2016 - Technical Report Using Honeynets and the Diamond Model for ICS Threat ... By John Kotheimer, Kyle O'Meara, Deana Shick

This report presents an approach to analyzing approximately 16 gigabytes of full packet capture data collected from an industrial control system honeynet,a network of seemingly vulnerable machines designed to lure attackers.

White Paper | April 1997 - White Paper An Analysis of Security Incidents on the Internet By John Howard, George Weaver

In this dissertation, John D. Howard reviews an analysis of security incidents on the Internet from between 1989 and 1995.

Presentation | January 2000 - Presentation The Survivable Network Analysis Method: Assessing ...

This presentation introduces the survivable network analysis method, developed by the Software Engineering Institute's (SEI) CERT/Coordination Center.

Presentation | January 2006 - Presentation Vulnerability Discovery: Bridging the Gap Between Analysis ...

This 2006 CERT presentation provides an overview of the vulnerability discovery field and discusses how it can be used to improve the practice of security engineering.

Presentation | August 2015 - Presentation Systemic Vulnerabilities: An Allegorical Tale of ... By Allen D. Householder

In this talk, we will trace the origin and evolution of a physical-world vulnerability that dates to the late 19th century, and explore whether

White Paper | December 2005 - White Paper Botnets as a Vehicle for Online Crime By Nicholas Ianelli, Aaron Hackworth

In this paper, the authors describe the capabilities present in bot malware and the motivations for operating botnets.

Technical Note | January 2005 - Technical Note A Structured Approach to Classifying Security Vulnerabilities By Robert C. Seacord, Allen D. Householder

In this 2005 report, the authors propose a classification scheme that uses attribute-value pairs to provide a multidimensional view of vulnerabilities.

Annual Report | July 2006 - Annual Report CERT Research 2005 Annual Report

This report provides brief abstracts for major research projects, followed by more detailed descriptions of these projects, for all CERT research conducted in the year 2005.

CERT Research Report | January 2005 - CERT Research Report 2005 CERT Research Report

In this 2005 report, the authors summarize CERT research conducted in fiscal year 2005.

Brochure | February 2016 - Brochure It's Time to Engage with the CERT Division

Learn how the CERT Division can help you keep pace with cybersecurity challenges.

Refine