Dormann, W., 2019: The Dangers of VHD and VHDX Files. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed May 6, 2026, https://www ...
This Tactical Guide helps programs understand how software metrics offer insights into the health, effectiveness, and efficiency of the mission capability it develops. This Tactical Guide helps ...
This Supplement shows the hidden value in the metrics that programs are already collecting if they are on the Software Acquisition Pathway. The Pack Light, Measure Right Tactical Guide provided ...
Hutchison, S. (2021, August 9). DNS Over HTTPS: 3 Strategies for Enterprise Security Monitoring. Retrieved May 12, 2026, from https://www.sei.cmu.edu/blog/dns-over ...
The Malware Technical Exchange Meeting (MTEM) is an annual classified meeting that brings together practitioners and researchers from government, FFRDCs, academia, and industry. Now in its 17th year, ...
Tucker, B., 2017: The 3 Pillars of Enterprise Cyber Risk Management. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed May 7 ...
Ozkaya, I., and Nord, R., 2019: Managing the Consequences of Technical Debt: 5 Stories from the Field. Carnegie Mellon University, Software Engineering Institute's ...
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Schmidt, D., and Robert, J., 2024: Applying Large Language Models to DoD Software Acquisition: An Initial Experiment. Carnegie Mellon University, Software Engineering ...
Shevchenko, N., 2020: An Introduction to Model-Based Systems Engineering (MBSE). Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Hoover, A., and Stewart, K., 2020: Cybersecurity Maturity Model Certification (CMMC) Part 2: Process Maturity's Role in Cybersecurity. Carnegie Mellon University ...
The CERT Division, in partnership with ExactData, LLC, and under sponsorship from DARPA I2O, generated a collection of synthetic insider threat test datasets. These datasets provide both synthetic ...