Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 491 results for the Type - White Paper

White Paper | May 2010 - White Paper The Illusion of Certainty - Paper By Grady Campbell

In this 2010 paper, Grady Campbell - delivered at the 7th Acquisition Research Symposium - argues that a new approach to acquisition is needed that recognizes that hiding uncertainty is detrimental to success.

White Paper | October 2006 - White Paper Scalable Flow Analysis (White Paper) By Abhishek Kumar (University of Maryland), Sapan Bhatia (Princeton)

In this paper, the authors present a new approach for summarization and analysis of flow records.

White Paper | May 2013 - White Paper How You Can Help Your Utility Clients with a Critical Aspect of ... By The SGMM Communications Team

This paper discusses how you can use the Smart Grid Maturity Model (SGMM) to benefit your utility clients.

White Paper | January 1994 - White Paper White Papers

A list of all white papers in the SEI library in descending order by publication date.

White Paper | May 2013 - White Paper Software Security Engineering: A Guide for Project Managers ... By Gary McGraw, Julia H. Allen, Nancy R. Mead, Robert J. Ellison, Sean Barnum

In this guide, the authors discuss our reliance on software and systems that use the internet or internet-exposed private networks.

White Paper | February 2017 - White Paper The CISO Academy By Pamela D. Curtis, Summer C. Fowler, David Tobar, David Ulicne

In this paper, the authors describe the project that led to the creation of the U.S. Postal Service's CISO Academy.

White Paper | June 2017 - White Paper The Hard Choices Game Explained By Nanette Brown, Philippe Kruchten, Erin Lim, Robert Nord, Ipek Ozkaya

The Hard Choices game is a simulation of the software development cycle meant to communicate the concepts of uncertainty, risk, and technical debt.

White Paper | October 2006 - White Paper Attribution and Aggregation of Network Flows for Security ... By Annarita Giani (UC Berkeley), IanGregorioDe Souza (Dartmouth College), Vincent Berk (Dartmouth College), George Cybenko (Dartmouth College)

In this paper, the authors describe a network flow analyzer capable of attribution and aggregation of different flows to identify suspicious behaviors.

White Paper | October 2006 - White Paper A Traffic Analysis of a Small Private Network Compromised by ... By Ron McLeod (Corporate Development Telecom Applications Research Alliance)

In this paper, Ron McLeod describes a network traffic capture and analysis used to investigate network performance issues of a small private network.

White Paper | October 2006 - White Paper Anomaly Detection Through Blind Flow Analysis Inside a ... By Ron McLeod (Corporate Development Telecom Applications Research Alliance), Vagishwari Nagaonkar (Wipro Technologies)

In this paper, the authors describe how hosts may be clustered into user workstations, servers, printers, and hosts compromised by worms.

Refine