Dormann, W., 2019: The Dangers of VHD and VHDX Files. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed May 13, 2026, https://www ...
Published between 1997 and 2006, CERT Tech Tips helped organizations and individuals navigate security concerns and provided answers to frequently asked questions.
Turri, V., Schieber, N., Loughin, C., and Brooks, T., 2026: The ELM Library: An LLM Evaluation Toolset. Carnegie Mellon University, Software Engineering Institute's ...
Gardner, C., 2017: Establishing Baseline Behaviors (Part 14 of 20: CERT Best Practices to Mitigate Insider Threats Series). Carnegie Mellon University, Software ...
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
This newsletter compiles the latest SEI releases and news about the Artificial Intellience (AI) Adoption Maturity Model; applying causal learning to evaluate large ...
Stewart, K., and Hoover, A., 2020: An Introduction to the Cybersecurity Maturity Model Certification (CMMC). Carnegie Mellon University, Software Engineering ...
Presents a testable SSVC that takes the form of decision trees and avoids some problems with the Common Vulnerability Scoring System (CVSS). Many organizations use the Common Vulnerability Scoring ...
The Architecture Tradeoff Analysis Method (ATAM) is a method for evaluating software architectures relative to quality attribute goals. ATAM evaluations expose architectural risks that potentially ...
Shevchenko, N., 2020: An Introduction to Model-Based Systems Engineering (MBSE). Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Shevchenko, N., 2018: Threat Modeling: 12 Available Methods. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed May 13, 2026 ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results