Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 38 results for the Publish Year - 2005

White Paper | August 2005 - White Paper Information Technology: Programming Languages, Their ... By Fred Long, Robert C. Seacord

In this paper, the authors present a standard specification for managed strings.

White Paper | December 2005 - White Paper Botnets as a Vehicle for Online Crime By Nicholas Ianelli, Aaron Hackworth

In this paper, the authors describe the capabilities present in bot malware and the motivations for operating botnets.

White Paper | June 2005 - White Paper Word Level Predicate Abstraction and Refinement for ... By Daniel Kroening, Natasha Sharygina, Edmund Clarke

This paper proposes to use predicate abstraction for verifying RTL Verilog, a technique successfully used for software verification.

White Paper | November 2005 - White Paper Survivability and Information Assurance Curriculum Overview

The Survivability and Information Assurance (SIA) Curriculum is designed to teach experienced system administrators about security as well as a means for integrating security into their routine tasks.

White Paper | September 2005 - White Paper CANINE: A NetFlows Converter/Anonymizer Tool for Format ... By Katherine Luo (National Center for Supercomputing Applications (NCSA): University of Illinois at Urbana-Champaign), Adam Slagell (National Center for Supercomputing Applications (NCSA): University of Illinois at Urbana-Champaign), William Yurcik (National Center for Supercomputing Applications (NCSA): University of Illinois at Urbana-Champaign), Yifan Li (National Center for Supercomputing Applications (NCSA): University of Illinois at Urbana-Champaign)

In this paper, the authors introduce a tool to address two problems with using Net-Flow logs for security analysis.

White Paper | June 2005 - White Paper Spyware By Aaron Hackworth

In this 2005 paper, the authors give an overview of spyware, provide examples of common threats, and describe how to defend against spyware.

White Paper | September 2005 - White Paper R: A Proposed Analysis and Visualization Environment for ... By Josh McNutt

In this paper, Josh McNutt discusses the R statistical language as an analysis and visualization interface to SiLK flow analysis tools.

White Paper | May 2005 - White Paper Technical Trends in Phishing Attacks By Jason Milletary

In this paper, Jason Milletary identifies technical capabilities used to conduct phishing scams, reviews trends, and discusses countermeasures.

White Paper | August 2005 - White Paper Limits to Effectiveness in Computer Security Incident ... By Johannes Wiik (Agder University College Norway), Jose J. Gonzalez (Agder University College Norway)

In this paper, the authors present an attempt to gain a better understanding of how a CSIRT can handle a growing work load with limited resources.

White Paper | August 2005 - White Paper Simulating Insider Cyber-Threat Risks: A Model-Based Case ... By Eliot Rich (University at Albany State University of New York), Howard F. Lipson, Dave Mundie, Jose M. Sarriegui (University of Navarra Spain), Agata Sawicka (Agder University College Norway), Thomas R. Stewart (University at Albany State University of New York), Jose M. Torres (University of Navarra Spain), Elise A. Weaver (Worcester Polytechnic Institute), Johannes Wiik (Agder University College Norway), Ignacio J. Martinez-Moyano (University at Albany State University of New York), Paul Conrad, Dawn Cappelli, Andrew P. Moore, Timothy J. Shimeall, David F. Andersen (University at Albany State University of New York), Jose J. Gonzalez (Agder University College Norway), Robert J. Ellison

In this paper, the authors identify actions that may inadvertently lead to increased vulnerability to threats from employees, contractors, and clients.

Refine