Showing 1 - 10 of 487 results for the Type - White Paper
This paper discusses twelve threat modeling methods from a variety of sources that target different parts of the development process.
This paper compares threat modeling methods for cyber-physical systems and recommends which methods (and combinations of methods) to use.
A list of all white papers in the SEI library in descending order by publication date.
In this paper, the authors present a new approach for summarization and analysis of flow records.
In this 2010 paper, Grady Campbell - delivered at the 7th Acquisition Research Symposium - argues that a new approach to acquisition is needed that recognizes that hiding uncertainty is detrimental to success.
This paper explores low cost technical solutions that can help organizations prevent, detect, and respond to insider incidents.
In this guide, the authors discuss our reliance on software and systems that use the internet or internet-exposed private networks.
In this paper, David Svoboda provides the findings of a SCALe audit on a codebase.
In this paper, the authors show how IPFIX and PSAMP can be used to support network security.
In this paper, the authors introduce a method for detecting the onset of anomalous port-specific activity by recognizing deviation from correlated activity.