Showing 1 - 10 of 487 results for Type - White Paper
This paper compares threat modeling methods for cyber-physical systems and recommends which methods (and combinations of methods) to use.
The SEI compiled this bibliography of publications about software architecture as a resource for information about system architecture throughout its lifecycle.
This paper discusses twelve threat modeling methods from a variety of sources that target different parts of the development process.
This paper explores low cost technical solutions that can help organizations prevent, detect, and respond to insider incidents.
This short report provides a summary of the various analyses of the blacklist ecosystem performed from July 1, 2017, through December 31, 2017.
This document provides security researchers with a repeatable methodology to produce more thorough and actionable results when analyzing embedded devices for vulnerabilities.
This doctoral thesis, completed at Vrije Universiteit Amsterdam, focuses on software architecture practices for systems of systems, including data-intensive systems.
This short report provides a summary of the various analyses of the blacklist ecosystem performed to date. It also appends the latest additional data to those analyses; the added data in this report covers the time period from January through June 2017.
The Hard Choices game is a simulation of the software development cycle meant to communicate the concepts of uncertainty, risk, and technical debt.
The Federal Virtual Training Environment (FedVTE) is an online, on‐demand training system containing cybersecurity and certification prep courses, at no cost to federal, state, and local government employees.