Firesmith, D., 2019: System Resilience: What Exactly is it?. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed January 22, 2026 ...
Shevchenko, N., 2020: An Introduction to Model-Based Systems Engineering (MBSE). Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Complete the form below to register and download a free online copy of SEI CERT C Coding Standard: Rules for Developing Safe, Reliable, and Secure Systems (2016 Edition). Writing secure C code helps ...
Scherlis, B., 2024: Weaknesses and Vulnerabilities in Modern AI: Integrity, Confidentiality, and Governance. Carnegie Mellon University, Software Engineering ...
CERT Insider Threat Center, T., 2010: Insider Threat Deep Dive: IT Sabotage. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Dormann, W., 2016: The Risks of Google Sign-In on iOS Devices. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed January 23, 2026 ...
Mehravari, N., and Allen, J., 2016: Structuring the Chief Information Security Officer (CISO) Organization. Carnegie Mellon University, Software Engineering Institute ...
The Cyber Mission Readiness team at the SEI develops software tools and methodologies for conducting high-quality cyber experimentation and exercises for the Department of War (DoW) and beyond. The ...
This collection contains resources about the Architecture Tradeoff Analysis Method (ATAM), a method for evaluating software architectures against quality attribute goals. The Architecture Tradeoff ...
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Scanlon, T., 2023: Cybersecurity of Quantum Computing: A New Frontier. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed January ...