Fricke, J., and Hoover, A., 2018: Cybersecurity Architecture, Part 2: System Boundary and Boundary Protection. Carnegie Mellon University, Software Engineering ...
Firesmith, D., 2015: Four Types of Shift Left Testing. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed October 29, 2025, https ...
Schmidt, D., and Sledge, C., 2016: A Naval Perspective on Open-Systems Architecture. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Executive Order 13587 requires federal agencies that operate or access classified computer networks to implement an insider threat detection and prevention program. Proposed changes to the National ...
Zubrow, D., 2012: High Maturity Software Engineering Measurement and Analysis. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Keylor, E., Beveridge, R., and Frederick, J., 2025: Amplifying AI Readiness in the DoD Workforce. Carnegie Mellon University, Software Engineering Institute's ...
Scherlis, B., 2024: The Latest Work from the SEI: Counter AI, Coordinated Vulnerability Disclosure, and Artificial Intelligence Engineering. Carnegie Mellon University, Software Engineering ...
CERT Insider Threat Center, T., 2010: Welcome to the Insider Threat Blog. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Over the past decade, artificial intelligence (AI) has made remarkable strides. From deep neural networks that can identify and label objects in images, to AI systems that outperform humans in complex ...
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Schmidt, D., and Robert, J., 2024: Applying Large Language Models to DoD Software Acquisition: An Initial Experiment. Carnegie Mellon University, Software Engineering ...
Faatz, D., 2018: Best Practices for Cloud Security. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed November 10, 2025, https ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results