Gregory Touhill, CERT Division Director, and Matthew Butkovic, technical director of cyber risk and resilience, co-authored tools for corporate boards dealing with quantum computing, AI, and other ...
Benitez, M., 2023: Software Isolation: Why It Matters to Software Evolution and Why Everybody Puts It Off. Carnegie Mellon University, Software Engineering Institute ...
Using large language models (LLMs) to adjudicate static analysis alerts enables more complete alert adjudication, reducing unknown risk and improving software security. Software vulnerabilities pose a ...
In this webcast, Justin Novak and Christopher Ian Rodman discuss how AI can be leveraged to build out and enable your security operations center (SOC) by covering gaps in tools, workforce, and ...
The Software Engineering Institute establishes and advances software as a strategic advantage for national security. We lead and direct research and transition of software engineering, cyber, ...
Since our foundation in 1984, we have helped the Department of War (DoW), government agencies, and private industry meet mission goals and gain strategic advantage by innovating and advancing the ...
Building an effective security operations capability such as a security operations center (SOC) has always been a challenging endeavor. Balancing the need to successfully integrate the people, ...
Students who wish to purchase the CERT Leadership in AI for Cybersecurity certificate package (three eLearning courses, instructor-led 2-day workshop) will receive a discount from the total cost. The ...
Shevchenko, N., 2020: An Introduction to Model-Based Systems Engineering (MBSE). Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Wassermann, G., and Svoboda, D., 2023: Rust Vulnerability Analysis and Maturity Challenges. Carnegie Mellon University, Software Engineering Institute's Insights ...
The Architecture Tradeoff Analysis Method (ATAM) is a method for evaluating software architectures relative to quality attribute goals. ATAM evaluations expose architectural risks that potentially ...
Svoboda, D., and Flynn, L., 2025: AI-Powered Memory Safety with the Pointer Ownership Model. Carnegie Mellon University, Software Engineering Institute's Insights ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results