Showing 1 - 10 of 179 results for Type - Special Report
The Army Cyber Institute hosted a Cyber Mutual Assistance Workshop to identify challenges in defining cyber requirements for Regional Mutual Assistance Groups.
This guide provides an introduction to the key concepts, principles, and roles necessary to establish a successful Coordinated Vulnerability Disclosure process. It also provides insights into how CVD can go awry and how to respond when it does so.
This report describes a test framework that the CERT/CC developed to identify systemic and other vulnerabilities in CPE routers.
This report chronicles the technical accomplishments of the Software Engineering Institute and its impact on the Department of Defense software community, as well as on the broader software engineering community.
This report discusses request-for-proposal patterns and techniques for successfully contracting a federal Agile project.
This report provides members of the Commercial Mobile Service Provider (CMSP) community with practical guidance for better managing cybersecurity risk exposure, based on an SEI study of the CMSP element of the Wireless Emergency Alert pipeline.
This report presents instructions for using the Malware-driven Overlooked Requirements (MORE) website applications.
This report summarizes an architecture-led safety analysis of the aircraft-survivability situation-awareness system for the Joint Multi-Role vertical lift program.
This report describes a method for capturing information from requirements documents in AADL and the draft Requirement Definition & Analysis Language Annex.
This report describes a method for capturing information from requirements documents in AADL to identify potential integration problems early in system development.