Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 632 results for Type - Technical Report

Technical Report | April 2018 - Technical Report ROI Analysis of the System Architecture Virtual Integration ... By Jörgen Hansson (University of Skovde), Steve Helton (The Boeing Company), Peter H. Feiler

This report presents an analysis of the economic effects of the System Architecture Virtual Integration approach on the development of software-reliant systems for aircraft compared to existing development paradigms.

Technical Report | October 2017 - Technical Report 2017 Emerging Technology Domains Risk Survey By Dan J. Klinedinst, Joel Land, Kyle O'Meara

This report describes our understanding of future technologies and helps US-CERT identify vulnerabilities, promote security practices, and understand vulnerability risk.

Technical Report | September 2017 - Technical Report R-EACTR: A Framework for Designing Realistic Cyber ... By Geoffrey B. Dobson, Thomas G. Podnar, Adam D. Cerini, Luke J. Osterritter

Introduces a design framework for cyber warfare exercises. It ensures that in designing team-based exercises, realism is factored into every aspect of the participant experience.

Technical Report | July 2017 - Technical Report Department of Defense Software Factbook By Brad Clark, Christopher Miller, James McCurley, David Zubrow, Rhonda Brown, Mike Zuccher (No Affiliation)

In this report, the Software Engineering Institute has analyzed data related to DoD software projects and translated it into information that is frequently sought-after across the DoD.

Technical Report | July 2017 - Technical Report DidFail: Coverage and Precision Enhancement By Karan Dwivedi (No Affiliation), Hongli Yin (No Affiliation), Pranav Bagree (No Affiliation), Xiaoxiao Tang (No Affiliation), Lori Flynn, William Klieber, William Snavely

This report describes recent enhancements to Droid Intent Data Flow Analysis for Information Leakage (DidFail), the CERT static taint analyzer for sets of Android apps.

Technical Report | April 2017 - Technical Report IEEE Computer Society/Software Engineering Institute Watts S ... By Neal Mackertich (Raytheon), Peter Kraus (Raytheon), Kurt Mittelstaedt (Raytheon), Brian Foley (Raytheon), Dan Bardsley (Raytheon), Kelli Grimes (Raytheon), Mike Nolan (Raytheon)

The Raytheon Integrated Defense Systems DFSS team has been recognized with the 2016 Watts Humphrey Software Process Achievement Award.

Technical Report | April 2017 - Technical Report IEEE Computer Society/Software Engineering Institute Watts S ... By Will J.M. Pohlman (Nationwide IT)

This report describes the 10-year history of Nationwide's software process improvement journey. Nationwide received the 2016 Watts Humphrey Software Process Achievement Award from the SEI and IEEE.

Technical Report | December 2016 - Technical Report Common Sense Guide to Mitigating Insider Threats, Fifth ... By Matthew L. Collins, Michael C. Theis, Randall F. Trzeciak, Jeremy R. Strozer, Jason W. Clark, Daniel L. Costa, Tracy Cassidy, Michael J. Albrethsen, Andrew P. Moore

Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.

Technical Report | December 2016 - Technical Report Architecture-Led Safety Process By Peter H. Feiler, Julien Delange, David P. Gluch, John McGregor

Architecture-Led Safety Analysis (ALSA) is a safety analysis method that uses early architecture knowledge to supplement traditional safety analysis techniques to identify faults as early as possible.

Technical Report | December 2016 - Technical Report The Critical Role of Positive Incentives for Reducing Insider ... By Andrew P. Moore, Jeff Savinda, Elizabeth A. Monaco, Jamie L. Moyes, Denise M. Rousseau (Carnegie Mellon University), Samuel J. Perl, Jennifer Cowley, Matthew L. Collins, Tracy Cassidy, Nathan VanHoudnos, Palma Buttles-Valdez, Daniel Bauer, Allison Parshall

This report describes how positive incentives complement traditional practices to provide a better balance for organizations' insider threat programs.

Refine