Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 487 results for the Type - White Paper

White Paper | August 2018 - White Paper Threat Modeling: A Summary of Available Methods By Nataliya Shevchenko, Timothy A. Chick, Paige O'Riordan, Tom Scanlon, Carol Woody - PhD

This paper discusses twelve threat modeling methods from a variety of sources that target different parts of the development process.

White Paper | September 2018 - White Paper Threat Modeling for Cyber-Physical System-of-Systems ... By Nataliya Shevchenko, Brent Frye, Carol Woody - PhD

This paper compares threat modeling methods for cyber-physical systems and recommends which methods (and combinations of methods) to use.

White Paper | January 1994 - White Paper White Papers

A list of all white papers in the SEI library in descending order by publication date.

White Paper | October 2006 - White Paper Scalable Flow Analysis (White Paper) By Abhishek Kumar (University of Maryland), Sapan Bhatia (Princeton)

In this paper, the authors present a new approach for summarization and analysis of flow records.

White Paper | May 2010 - White Paper The Illusion of Certainty - Paper By Grady Campbell

In this 2010 paper, Grady Campbell - delivered at the 7th Acquisition Research Symposium - argues that a new approach to acquisition is needed that recognizes that hiding uncertainty is detrimental to success.

White Paper | July 2018 - White Paper Navigating the Insider Threat Tool Landscape: Low-Cost ... By Derrick Spooner, George Silowash, Daniel L. Costa, Michael J. Albrethsen

This paper explores low cost technical solutions that can help organizations prevent, detect, and respond to insider incidents.

White Paper | May 2013 - White Paper Software Security Engineering: A Guide for Project Managers ... By Gary McGraw, Julia H. Allen, Nancy R. Mead, Robert J. Ellison, Sean Barnum

In this guide, the authors discuss our reliance on software and systems that use the internet or internet-exposed private networks.

White Paper | April 2015 - White Paper SCALe Analysis of JasPer Codebase By David Svoboda

In this paper, David Svoboda provides the findings of a SCALe audit on a codebase.

White Paper | October 2006 - White Paper IPFIX/PSAMP: What Future Standards Can Offer to Network ... By Tanja Zseby (Fraunhofer Fokus), Elisa Boschi (Hitachi), Thomas Hirsch (Fraunhofer Fokus), Mark Lutz (Fraunhofer Fokus)

In this paper, the authors show how IPFIX and PSAMP can be used to support network security.

White Paper | September 2005 - White Paper Correlations Between Quiescent Ports in Network Flows ... By Josh McNutt, Markus Deshon

In this paper, the authors introduce a method for detecting the onset of anomalous port-specific activity by recognizing deviation from correlated activity.

Refine