Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 487 results for Type - White Paper

White Paper | September 2018 - White Paper Threat Modeling for Cyber-Physical System-of-Systems ... By Nataliya Shevchenko, Brent Frye, Carol Woody - PhD

This paper compares threat modeling methods for cyber-physical systems and recommends which methods (and combinations of methods) to use.

White Paper | September 2018 - White Paper Software Architecture Publications

The SEI compiled this bibliography of publications about software architecture as a resource for information about system architecture throughout its lifecycle.

White Paper | August 2018 - White Paper Threat Modeling: A Summary of Available Methods By Nataliya Shevchenko, Timothy A. Chick, Paige O'Riordan, Tom Scanlon, Carol Woody - PhD

This paper discusses twelve threat modeling methods from a variety of sources that target different parts of the development process.

White Paper | July 2018 - White Paper Navigating the Insider Threat Tool Landscape: Low-Cost ... By Derrick Spooner, George Silowash, Daniel L. Costa, Michael J. Albrethsen

This paper explores low cost technical solutions that can help organizations prevent, detect, and respond to insider incidents.

White Paper | April 2018 - White Paper Blacklist Ecosystem Analysis: July - December 2017 By Eric Hatleback, Leigh B. Metcalf

This short report provides a summary of the various analyses of the blacklist ecosystem performed from July 1, 2017, through December 31, 2017.

White Paper | December 2017 - White Paper Embedded Device Vulnerability Analysis Case Study Using ... By Madison Oliver, Kyle O'Meara

This document provides security researchers with a repeatable methodology to produce more thorough and actionable results when analyzing embedded devices for vulnerabilities.

White Paper | September 2017 - White Paper Architecture Practices for Complex Contexts By John Klein

This doctoral thesis, completed at Vrije Universiteit Amsterdam, focuses on software architecture practices for systems of systems, including data-intensive systems.

White Paper | August 2017 - White Paper Blacklist Ecosystem Analysis: January - June, 2017 By Eric Hatleback, Leigh B. Metcalf

This short report provides a summary of the various analyses of the blacklist ecosystem performed to date. It also appends the latest additional data to those analyses; the added data in this report covers the time period from January through June 2017.

White Paper | June 2017 - White Paper The Hard Choices Game Explained By Nanette Brown, Philippe Kruchten, Erin Lim, Robert Nord, Ipek Ozkaya

The Hard Choices game is a simulation of the software development cycle meant to communicate the concepts of uncertainty, risk, and technical debt.

White Paper | June 2017 - White Paper Federal Virtual Training Environment (FedVTE) By Marie Baker, April Galyardt, Dominic A. Ross

The Federal Virtual Training Environment (FedVTE) is an online, on‐demand training system containing cybersecurity and certification prep courses, at no cost to federal, state, and local government employees.

Refine