Turri, V., Schieber, N., Loughin, C., and Brooks, T., 2026: The ELM Library: An LLM Evaluation Toolset. Carnegie Mellon University, Software Engineering Institute's ...
Dormann, W., 2019: The Dangers of VHD and VHDX Files. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed May 6, 2026, https://www ...
Tucker, B., 2017: The 3 Pillars of Enterprise Cyber Risk Management. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed May 7 ...
Gardner, C., 2017: Establishing Baseline Behaviors (Part 14 of 20: CERT Best Practices to Mitigate Insider Threats Series). Carnegie Mellon University, Software ...
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Software is vital to our country’s global competitiveness, innovation, and national security. It also ensures our modern standard of living and enables continued advances in defense, infrastructure, ...
Hoover, A., and Stewart, K., 2020: Cybersecurity Maturity Model Certification (CMMC) Part 2: Process Maturity's Role in Cybersecurity. Carnegie Mellon University ...
The Architecture Tradeoff Analysis Method (ATAM) is a method for evaluating software architectures relative to quality attribute goals. ATAM evaluations expose architectural risks that potentially ...
Wilson, S., Place, P., and Korzec, K., 2023: The Seven Virtues of Reconciling Agile and Earned Value Management (EVM). Carnegie Mellon University, Software ...
Shevchenko, N., 2020: An Introduction to Model-Based Systems Engineering (MBSE). Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
The Stakeholder-specific Vulnerability Categorization (SSVC) is a system for prioritizing actions during vulnerability management. SSVC aims to avoid one-size-fits-all solutions in favor of a modular ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results