- DocumentoA Targeted Improvement Plan for Service Continuitycargado porSoftware Engineering Institute Publications
- DocumentoROI Analysis of the System Architecture Virtual Integration Initiativecargado porSoftware Engineering Institute Publications
- DocumentoExploring the Use of Metrics for Software Assurancecargado porSoftware Engineering Institute Publications
- DocumentoIncident Management Capability Assessment Workbookcargado porSoftware Engineering Institute Publications
- DocumentoProgram Manager's Guidebook for Software Assurancecargado porSoftware Engineering Institute Publications
- DocumentoDoD Developer’s Guidebook for Software Assurancecargado porSoftware Engineering Institute Publications
- DocumentoGhosts in the Machine - DM18-0553cargado porSoftware Engineering Institute Publications
- DocumentoComposing Effective Software Security Assurance Workflowscargado porSoftware Engineering Institute Publications
- Documentofedclasscargado porSoftware Engineering Institute Publications
- DocumentoROI Analysis of the System Architecture Virtual Integration Initiativecargado porSoftware Engineering Institute Publications
- DocumentoPWP 6-461G1 DOE MARTIE Impact to Energy Sector and MARITE SRScargado porSoftware Engineering Institute Publications
- DocumentoA Mapping of the Health Insurance Portability and Accountability Act (HIPAA) Security Rule to the Cyber Resilience Review (CRR)cargado porSoftware Engineering Institute Publications
- DocumentoA Hybrid Threat Modeling Methodcargado porSoftware Engineering Institute Publications
- DocumentoThe CERT® Guide to Coordinated Vulnerability Disclosurecargado porSoftware Engineering Institute Publications
- DocumentoDefining a Progress Metric for CERT-RMM Improvementcargado porSoftware Engineering Institute Publications
- DocumentoDepartment of Defense Software Factbookcargado porSoftware Engineering Institute Publications
- DocumentoSystemic Vulnerabilities in Customer-Premises Equipment (CPE) Routerscargado porSoftware Engineering Institute Publications
- Documento17sr019.pdfcargado porSoftware Engineering Institute Publications
- Documento17sr019.pdfcargado porSoftware Engineering Institute Publications
- DocumentoIEEE Computer Society/Software Engineering Institute Watts S. Humphrey Software Process Achievement Award 2016cargado porSoftware Engineering Institute Publications
- DocumentoIEEE Computer Society/Software Engineering Institute Watts S. Humphrey Software Process Achievement (SPA) Award 2016cargado porSoftware Engineering Institute Publications
- DocumentoPrototype Software Assurance Framework (SAF)cargado porSoftware Engineering Institute Publications
- DocumentoA Technical History of the SEIcargado porSoftware Engineering Institute Publications
- DocumentoThe Critical Role of Positive Incentives for Reducing Insider Threatscargado porSoftware Engineering Institute Publications
- DocumentoUpdate 2016cargado porSoftware Engineering Institute Publications
- DocumentoScaling Agile Methods for Department of Defense Programscargado porSoftware Engineering Institute Publications
- Documento2016sr025cargado porSoftware Engineering Institute Publications
- Documento2016sr025.pdfcargado porSoftware Engineering Institute Publications
- DocumentoArchitecture Fault Modeling and Analysis with the Error Model Annex, Version 2cargado porSoftware Engineering Institute Publications
- DocumentoA Requirement Specification Language for AADLcargado porSoftware Engineering Institute Publications
- Documento2016tr005-final.pdfcargado porSoftware Engineering Institute Publications
- DocumentoDMPLcargado porSoftware Engineering Institute Publications
- DocumentoWireless Emergency Alerts Commercial Mobile Service Provider (CMSP) Cybersecurity Guidelinescargado porSoftware Engineering Institute Publications
- DocumentoReport Writer and Security Requirements Findercargado porSoftware Engineering Institute Publications
- DocumentoAn Insider Threat Indicator Ontologycargado porSoftware Engineering Institute Publications
- DocumentoUsing Honeynets and the Diamond Model for ICS Threat Analysiscargado porSoftware Engineering Institute Publications
- DocumentoA Unique Approach to Threat Analysis Mappingcargado porSoftware Engineering Institute Publications
- Documento2016 Emerging Technology Domains Risk Surveycargado porSoftware Engineering Institute Publications
- DocumentoCyber-Foraging for Improving Survivability of Mobile Systemscargado porSoftware Engineering Institute Publications
- DocumentoCyber + Culture Early Warning Studycargado porSoftware Engineering Institute Publications
- DocumentoExtending AADL for Security Design Assurance of Cyber-Physical Systemscargado porSoftware Engineering Institute Publications
- DocumentoIntelligence Preparation for Operational Resilience (IPOR)cargado porSoftware Engineering Institute Publications
- DocumentoEvaluating and Mitigating the Impact of Complexity in Software Modelscargado porSoftware Engineering Institute Publications
- DocumentoStructuring the Chief Information Security Officer Organizationcargado porSoftware Engineering Institute Publications
- DocumentoImproving Federal Cybersecurity Governance Through Data-Driven Decision Making and Executioncargado porSoftware Engineering Institute Publications
- DocumentoContracting for Agile Software Development in the Department of Defensecargado porSoftware Engineering Institute Publications
- DocumentoEnabling Incremental Iterative Development at Scalecargado porSoftware Engineering Institute Publications
- DocumentoState of Practice Reportcargado porSoftware Engineering Institute Publications
- DocumentoModel-Driven Engineeringcargado porSoftware Engineering Institute Publications