Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 176 results for the Type - Special Report

Special Report | August 2017 - Special Report The CERT Guide to Coordinated Vulnerability Disclosure By Allen D. Householder, Garret Wassermann, Art Manion, Christopher King

This guide provides an introduction to the key concepts, principles, and roles necessary to establish a successful Coordinated Vulnerability Disclosure process. It also provides insights into how CVD can go awry and how to respond when it does so.

Special Report | July 2017 - Special Report Systemic Vulnerabilities in Customer-Premises Equipment ... By Joel Land

This report describes a test framework that the CERT/CC developed to identify systemic and other vulnerabilities in CPE routers.

Special Report | January 2017 - Special Report A Technical History of the SEI By Larry Druffel

This report chronicles the technical accomplishments of the Software Engineering Institute and its impact on the Department of Defense software community, as well as on the broader software engineering community.

Special Report | December 2016 - Special Report RFP Patterns and Techniques for Successful Agile ... By Mary Ann Lapham, Larri Ann Rosser (Raytheon Intelligence Information and Services), Steven Martin (Space and Missile Systems Center), Thomas E. Friend (Agile On Target), Peter Capell, Keith Korzec, Greg Howard (MITRE), Michael Ryan (BTAS), John H. Norton III (Raytheon Integrated Defense Systems)

This report discusses request-for-proposal patterns and techniques for successfully contracting a federal Agile project.

Special Report | June 2016 - Special Report Wireless Emergency Alerts Commercial Mobile Service ... By Christopher J. Alberts, Audrey J. Dorofee, Carol Woody - PhD

This report provides members of the Commercial Mobile Service Provider (CMSP) community with practical guidance for better managing cybersecurity risk exposure, based on an SEI study of the CMSP element of the Wireless Emergency Alert pipeline.

Special Report | June 2016 - Special Report Report Writer and Security Requirements Finder: User and ... By Nancy R. Mead, Anand Sankalp (Carnegie Mellon University), Gupta Anurag (Carnegie Mellon), Priyam Swati (Carnegie Mellon University), Yaobin Wen (Carnegie Mellon University), Walid El Baroni (Carnegie Mellon University)

This report presents instructions for using the Malware-driven Overlooked Requirements (MORE) website applications.

Special Report | December 2015 - Special Report Architecture-Led Safety Analysis of the Joint Multi-Role (JMR) ... By Peter H. Feiler

This report summarizes an architecture-led safety analysis of the aircraft-survivability situation-awareness system for the Joint Multi-Role vertical lift program.

Special Report | December 2015 - Special Report Requirements and Architecture Specification of the Joint Multi ... By Peter H. Feiler

This report describes a method for capturing information from requirements documents in AADL and the draft Requirement Definition & Analysis Language Annex.

Special Report | December 2015 - Special Report Potential System Integration Issues in the Joint Multi-Role ... By Peter H. Feiler, John J. Hudak

This report describes a method for capturing information from requirements documents in AADL to identify potential integration problems early in system development.

Special Report | December 2015 - Special Report Intelligence Preparation for Operational Resilience (IPOR) By Douglas Gray

The author describes Intelligence Preparation for Operational Resilience (IPOR), a framework for preparing intelligence that complements commonly used intelligence frameworks such as Intelligence Preparation of the Battlefield (IPB).

Refine