Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type


Publication Date

Showing 1 - 10 of 66 results for the Type - Article

Article | May 2017 - Article Graduate Curricula in Software Engineering and Software ... By Thomas B. Hilburn (Embry-Riddle Aeronautical University), Andrew J. Kornecki (Embry-Riddle Aeronautical University)

This paper discusses two related efforts to provide guidance about improving professional software engineering through graduate education.

Article | May 2017 - Article Assessing DoD System Acquisition Supply Chain Risk ... By John Haller, Charles M. Wallen, Carol Woody - PhD, Christopher J. Alberts

In this Crosstalk article, the authors discuss the growing challenge of cyber risks in the defense supply chain.

Article | January 2017 - Article Build Security In

This article lists resources that developers, architects, and security practitioners can use to build security into software during its development.

Article | November 2016 - Article Giant Slayer: Will You Let Software be David to Your Goliath ... By Stephen Blanchette - Jr.

The article discusses what can (and should) be done to improve the state of software engineering on large scale aerospace programs.

Article | April 2016 - Article Compliance Signaling Games: Toward Modeling the ... By William Casey, Jose A. Morales, Evan Wright, Quanyan Zhu (New York University), Bud Mishra (New York University)

In this paper, the authors analyze how the dynamics of compliance games illuminate the effectiveness or risks of an organizational policy.

Article | April 2016 - Article Inadvertent Leaks: Exploration via Agent-Based Dynamic ... By Kathleen Carley (Carnegie Mellon School of Computer Science), Geoffrey P. Morgan (Carnegie Mellon School of Computer Science)

In this paper, the authors describe the results of using their network model to simulate the flow of sensitive information in organizations.

Article | April 2016 - Article Using Dynamic Models to Support Inferences of Insider Threat ... By Paul J. Sticha (Human Resources Research Organization), Elise T. Axelrad (Human Resources Research Organization)

In this paper, the authors present a system dynamics model that incorporates psychological factors to simulate the pathway to insider attack.

Article | April 2016 - Article An Agent-Based Approach to Modeling Insider Threat By John A. Sokolowski (Old Dominion University), Catherine M. Banks (Old Dominion University), Thomas J. Dover (Federal Bureau of Investigation)

In this paper, the authors describe the modeling of the potential of an organization to develop an insider threat given certain attributes of its culture.

Article | April 2016 - Article Introduction to the Special Issue on Insider Threat Modeling ... By Andrew P. Moore, Kirk A. Kennedy (Federal Bureau of Investigation), Thomas J. Dover (Federal Bureau of Investigation)

In this publication, the authors introduce the area of insider threat modeling and simulation generally, and discuss the range of methods used in the research papers of the Special Issue.

Article | January 2016 - Article CYBURGH, PA: Solving the Workforce Shortfall in ... By Christopher May

In this teQ Magazine article, Chris May discusses how the cybersecurity workforce shortage hampers our ability to deal with cyberattacks and data breaches.