The study explores the risks and tradeoffs when adapting enterprise-IT security and zero trust principles to weapon systems.
DeCapria, D., 2025: DataOps: Towards More Reliable Machine Learning Systems. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Schmidt, D., and Sledge, C., 2016: A Naval Perspective on Open-Systems Architecture. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Cassidy, T., and CERT Insider Threat Center, T., 2018: Substance Use and Abuse: Potential Insider Threat Implications for Organizations. Carnegie Mellon University ...
The SEI is participating at the SciTech Forum 2026 ...
CERT Insider Threat Center, T., 2010: Welcome to the Insider Threat Blog. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Ruefle, R., 2017: Critical Asset Identification (Part 1 of 20: CERT Best Practices to Mitigate Insider Threats Series). Carnegie Mellon University, Software ...
Schmidt, D., and Robert, J., 2024: Applying Large Language Models to DoD Software Acquisition: An Initial Experiment. Carnegie Mellon University, Software Engineering ...
Sherman, M., 2024: Using ChatGPT to Analyze Your Code? Not So Fast. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed October 27 ...
This paper presents version 2.0 of a testable Stakeholder-Specific Vulnerability Categorization (SSVC) that takes the form of decision trees and that avoids some problems with the Common Vulnerability ...
Hughes, L., and Jackson, V., 2021: A Framework for DevSecOps Evolution and Achieving Continuous-Integration/Continuous-Delivery (CI/CD) Capabilities. Carnegie Mellon ...