Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type


Publication Date

Showing 1 - 10 of 70 results for Type - Article

Article | January 2018 - Article System-of-Systems Viewpoint for System Architecture ... By John Klein, Hans van Vliet (VU University)

We evaluated an architecture documentation viewpoint to address the concerns of a SoS architect about a constituent system, to support SoS design and analysis involving that constituent system.

Article | May 2017 - Article Graduate Curricula in Software Engineering and Software ... By Thomas B. Hilburn (Embry-Riddle Aeronautical University), Andrew J. Kornecki (Embry-Riddle Aeronautical University)

This paper discusses two related efforts to provide guidance about improving professional software engineering through graduate education.

Article | May 2017 - Article Assessing DoD System Acquisition Supply Chain Risk ... By Christopher J. Alberts, John Haller, Charles M. Wallen, Carol Woody - PhD

In this Crosstalk article, the authors discuss the growing challenge of cyber risks in the defense supply chain.

Article | January 2017 - Article Build Security In

This article lists resources that developers, architects, and security practitioners can use to build security into software during its development.

Article | November 2016 - Article Giant Slayer: Will You Let Software be David to Your Goliath ... By Stephen Blanchette - Jr.

The article discusses what can (and should) be done to improve the state of software engineering on large scale aerospace programs.

Article | April 2016 - Article Where to Integrate Security Practices on DevOps Platform By Hasan Yasar, Kiriakos Kontostathis

The article describes how to address security concerns early in the software development lifecycle and leverage that approach throughout the entire lifecycle.

Article | April 2016 - Article Compliance Signaling Games: Toward Modeling the ... By William Casey, Jose A. Morales, Evan Wright, Quanyan Zhu (New York University), Bud Mishra (New York University)

In this paper, the authors analyze how the dynamics of compliance games illuminate the effectiveness or risks of an organizational policy.

Article | April 2016 - Article Inadvertent Leaks: Exploration via Agent-Based Dynamic ... By Kathleen Carley (Carnegie Mellon School of Computer Science), Geoffrey P. Morgan (Carnegie Mellon School of Computer Science)

In this paper, the authors describe the results of using their network model to simulate the flow of sensitive information in organizations.

Article | April 2016 - Article Using Dynamic Models to Support Inferences of Insider Threat ... By Paul J. Sticha (Human Resources Research Organization), Elise T. Axelrad (Human Resources Research Organization)

In this paper, the authors present a system dynamics model that incorporates psychological factors to simulate the pathway to insider attack.

Article | April 2016 - Article An Agent-Based Approach to Modeling Insider Threat By John A. Sokolowski (Old Dominion University), Catherine M. Banks (Old Dominion University), Thomas J. Dover (Federal Bureau of Investigation)

In this paper, the authors describe the modeling of the potential of an organization to develop an insider threat given certain attributes of its culture.