Ozkaya, I., Carleton, A., Robert, J., and Schmidt, D., 2023: Application of Large Language Models (LLMs) in Software Engineering: Overblown Hype or Disruptive Change ...
CERT Insider Threat Center, T., 2015: Handling Threats from Disgruntled Employees. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Benitez Preciado, M., 2023: Software Isolation: Why It Matters to Software Evolution and Why Everybody Puts It Off. Carnegie Mellon University, Software Engineering ...
The guide is the first release in the Software Acquisition Go Bag series of resources for defense software programs seeking to advance acquisition practices.
This collection contains resources about the Architecture Tradeoff Analysis Method (ATAM), a method for evaluating software architectures against quality attribute goals. The Architecture Tradeoff ...
Novak, W., 2023: Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Clinging to the Old Ways. Carnegie Mellon University, Software Engineering Institute's ...
Ozkaya, I., and O'Hearn, B., 2024: 5 Recommendations to Help Your Organization Manage Technical Debt. Carnegie Mellon University, Software Engineering Institute's ...
Schmidt, D., and Robert, J., 2024: Applying Large Language Models to DoD Software Acquisition: An Initial Experiment. Carnegie Mellon University, Software Engineering ...
Stewart, K., and Hoover, A., 2020: An Introduction to the Cybersecurity Maturity Model Certification (CMMC). Carnegie Mellon University, Software Engineering ...
Groce, P., 2023: Using Game Theory to Advance the Quest for Autonomous Cyber Threat Hunting. Carnegie Mellon University, Software Engineering Institute's Insights ...
Spring, J., 2022: Probably Don’t Rely on EPSS Yet. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 23, 2025, https ...
The CERT Division, in partnership with ExactData, LLC, and under sponsorship from DARPA I2O, generated a collection of synthetic insider threat test datasets. These datasets provide both synthetic ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results