- DocumentoA Targeted Improvement Plan for Service Continuitycaricato daSoftware Engineering Institute Publications
- DocumentoROI Analysis of the System Architecture Virtual Integration Initiativecaricato daSoftware Engineering Institute Publications
- DocumentoExploring the Use of Metrics for Software Assurancecaricato daSoftware Engineering Institute Publications
- DocumentoIncident Management Capability Assessment Workbookcaricato daSoftware Engineering Institute Publications
- DocumentoProgram Manager's Guidebook for Software Assurancecaricato daSoftware Engineering Institute Publications
- DocumentoDoD Developer’s Guidebook for Software Assurancecaricato daSoftware Engineering Institute Publications
- DocumentoGhosts in the Machine - DM18-0553caricato daSoftware Engineering Institute Publications
- DocumentoComposing Effective Software Security Assurance Workflowscaricato daSoftware Engineering Institute Publications
- Documentofedclasscaricato daSoftware Engineering Institute Publications
- DocumentoROI Analysis of the System Architecture Virtual Integration Initiativecaricato daSoftware Engineering Institute Publications
- DocumentoPWP 6-461G1 DOE MARTIE Impact to Energy Sector and MARITE SRScaricato daSoftware Engineering Institute Publications
- DocumentoA Mapping of the Health Insurance Portability and Accountability Act (HIPAA) Security Rule to the Cyber Resilience Review (CRR)caricato daSoftware Engineering Institute Publications
- DocumentoA Hybrid Threat Modeling Methodcaricato daSoftware Engineering Institute Publications
- DocumentoThe CERT® Guide to Coordinated Vulnerability Disclosurecaricato daSoftware Engineering Institute Publications
- DocumentoDefining a Progress Metric for CERT-RMM Improvementcaricato daSoftware Engineering Institute Publications
- DocumentoDepartment of Defense Software Factbookcaricato daSoftware Engineering Institute Publications
- DocumentoSystemic Vulnerabilities in Customer-Premises Equipment (CPE) Routerscaricato daSoftware Engineering Institute Publications
- Documento17sr019.pdfcaricato daSoftware Engineering Institute Publications
- Documento17sr019.pdfcaricato daSoftware Engineering Institute Publications
- DocumentoIEEE Computer Society/Software Engineering Institute Watts S. Humphrey Software Process Achievement Award 2016caricato daSoftware Engineering Institute Publications
- DocumentoIEEE Computer Society/Software Engineering Institute Watts S. Humphrey Software Process Achievement (SPA) Award 2016caricato daSoftware Engineering Institute Publications
- DocumentoPrototype Software Assurance Framework (SAF)caricato daSoftware Engineering Institute Publications
- DocumentoA Technical History of the SEIcaricato daSoftware Engineering Institute Publications
- DocumentoThe Critical Role of Positive Incentives for Reducing Insider Threatscaricato daSoftware Engineering Institute Publications
- DocumentoUpdate 2016caricato daSoftware Engineering Institute Publications
- DocumentoScaling Agile Methods for Department of Defense Programscaricato daSoftware Engineering Institute Publications
- Documento2016sr025caricato daSoftware Engineering Institute Publications
- Documento2016sr025.pdfcaricato daSoftware Engineering Institute Publications
- DocumentoArchitecture Fault Modeling and Analysis with the Error Model Annex, Version 2caricato daSoftware Engineering Institute Publications
- DocumentoA Requirement Specification Language for AADLcaricato daSoftware Engineering Institute Publications
- Documento2016tr005-final.pdfcaricato daSoftware Engineering Institute Publications
- DocumentoDMPLcaricato daSoftware Engineering Institute Publications
- DocumentoWireless Emergency Alerts Commercial Mobile Service Provider (CMSP) Cybersecurity Guidelinescaricato daSoftware Engineering Institute Publications
- DocumentoReport Writer and Security Requirements Findercaricato daSoftware Engineering Institute Publications
- DocumentoAn Insider Threat Indicator Ontologycaricato daSoftware Engineering Institute Publications
- DocumentoUsing Honeynets and the Diamond Model for ICS Threat Analysiscaricato daSoftware Engineering Institute Publications
- DocumentoA Unique Approach to Threat Analysis Mappingcaricato daSoftware Engineering Institute Publications
- Documento2016 Emerging Technology Domains Risk Surveycaricato daSoftware Engineering Institute Publications
- DocumentoCyber-Foraging for Improving Survivability of Mobile Systemscaricato daSoftware Engineering Institute Publications
- DocumentoCyber + Culture Early Warning Studycaricato daSoftware Engineering Institute Publications
- DocumentoExtending AADL for Security Design Assurance of Cyber-Physical Systemscaricato daSoftware Engineering Institute Publications
- DocumentoIntelligence Preparation for Operational Resilience (IPOR)caricato daSoftware Engineering Institute Publications
- DocumentoEvaluating and Mitigating the Impact of Complexity in Software Modelscaricato daSoftware Engineering Institute Publications
- DocumentoStructuring the Chief Information Security Officer Organizationcaricato daSoftware Engineering Institute Publications
- DocumentoImproving Federal Cybersecurity Governance Through Data-Driven Decision Making and Executioncaricato daSoftware Engineering Institute Publications
- DocumentoContracting for Agile Software Development in the Department of Defensecaricato daSoftware Engineering Institute Publications
- DocumentoEnabling Incremental Iterative Development at Scalecaricato daSoftware Engineering Institute Publications
- DocumentoState of Practice Reportcaricato daSoftware Engineering Institute Publications
- DocumentoModel-Driven Engineeringcaricato daSoftware Engineering Institute Publications