Showing 1 - 10 of 106 results for Type - Video
Our team is conducting research to describe and quantify the acquisition “game” being played using modeling and simulation to frame the misaligned incentives.
Our team is developing a new prototype tool to help soldiers identify and exploit cyber opportunities in the physical environment.
Here at the Software Engineering Institute, we have created a new tool prototype that automatically explores a system's design trade space; that is, its possible combinations of system software, hardware, and configuration options.
By considering dynamic information in conjunction with static information, we can precisely locate such design flaws, and determine the root causes of bugs more quickly.
Good cyber intelligence practices—those that help you see the big picture—can prevent costly security breaches and help safeguard valuable assets and information.
The SEI Source Code Analysis Lab (SCALe) gives analysts the ability to focus on the most critical alerts from static analysis.
This research will help ensure the security and effectiveness of IoT devices in tactical environments.
By creating a secure-by-design language that renders certain types of bugs impossible to create, we aim to significantly reduce the risk inherent in the adoption of blockchain technology.
Watch Will Klieber in this SEI Cyber Minute as he discusses Inference of Memory Bounds: Preventing the Next Heartbleed.
Unfortunately, where there is software, there are risks from vulnerabilities. In response, the Department of Defense has recently expanded the key document governing acquisition, 5000.02.