Our latest podcast highlights an AI Adoption Maturity Model that organizations can use to create a roadmap for predictable AI adoption and realization of AI benefits.
Updyke, D., and Jaconski, M., 2022: Using Alternate Data Streams in the Collection and Exfiltration of Data. Carnegie Mellon University, Software Engineering ...
Eileen Wrubel (Technical Director of Smart Software Acquisition) of the Software Solutions Division at the SEI explains how program offices must consistently and continuously involve users in the ...
CERT Insider Threat Center, T., 2015: Handling Threats from Disgruntled Employees. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Ozkaya, I., Carleton, A., Robert, J., and Schmidt, D., 2023: Application of Large Language Models (LLMs) in Software Engineering: Overblown Hype or Disruptive Change ...
Gain knowledge of common problems that a data scientist encounters Become fluent in statistics with the help of a scripting language Increase predictive power and reduce risk within a model Better ...
Cassidy, T., and CERT Insider Threat Center, T., 2018: Substance Use and Abuse: Potential Insider Threat Implications for Organizations. Carnegie Mellon University ...
This contact form is for general questions and requests for contact. Do not use this contact form to send sensitive information. Please review the guidelines for sending sensitive information. If you ...
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
This paper presents a testable Stakeholder-Specific Vulnerability Categorization (SSVC) that takes the form of decision trees and that avoids some problems with the Common Vulnerability Scoring System ...
The SEI led the community in creating this multi-year research and development vision and roadmap for engineering next-generation software-reliant systems. Software is vital to our country’s global ...
This collection contains resources about the Architecture Tradeoff Analysis Method (ATAM), a method for evaluating software architectures against quality attribute goals. The Architecture Tradeoff ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results