The study explores the risks and tradeoffs when adapting enterprise-IT security and zero trust principles to weapon systems.
Hutchison, S., 2021: DNS Over HTTPS: 3 Strategies for Enterprise Security Monitoring. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Churilla, M., VanHoudnos, N., and Beveridge, R., 2023: The Challenge of Adversarial Machine Learning. Carnegie Mellon University, Software Engineering Institute's ...
Kartch, R., 2018: Best Practices and Considerations in Egress Filtering. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Shevchenko, N., 2022: Modeling Capabilities with Model-Based Systems Engineering (MBSE). Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Software architecture is the primary carrier of system qualities, such as performance, modifiability, and security. Architecture helps ensure that a design approach will yield an acceptable system and ...
Scherlis, B., 2024: Weaknesses and Vulnerabilities in Modern AI: Integrity, Confidentiality, and Governance. Carnegie Mellon University, Software Engineering ...
Complete the form below to register and download a free online copy of SEI CERT C++ Coding Standard: Rules for Developing Safe, Reliable, and Secure Systems in C++ (2016 Edition).
Executive Order 13587 requires federal agencies that operate or access classified computer networks to implement an insider threat detection and prevention program. Proposed changes to the National ...
Trzeciak, R., and CERT Insider Threat Center, T., 2017: Announcing the National Insider Threat Center. Carnegie Mellon University, Software Engineering Institute's ...
Keylor, E., Beveridge, R., and Frederick, J., 2025: Amplifying AI Readiness in the DoD Workforce. Carnegie Mellon University, Software Engineering Institute's ...
Critical Asset Identification (Part 1 of 20: CERT Best Practices to Mitigate Insider Threats Series)
Ruefle, R., 2017: Critical Asset Identification (Part 1 of 20: CERT Best Practices to Mitigate Insider Threats Series). Carnegie Mellon University, Software ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results