Dormann, W., 2019: The Dangers of VHD and VHDX Files. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed May 13, 2026, https://www ...
Turri, V., Schieber, N., Loughin, C., and Brooks, T., 2026: The ELM Library: An LLM Evaluation Toolset. Carnegie Mellon University, Software Engineering Institute's ...
Published between 1997 and 2006, CERT Tech Tips helped organizations and individuals navigate security concerns and provided answers to frequently asked questions.
This Supplement shows the hidden value in the metrics that programs are already collecting if they are on the Software Acquisition Pathway. The Pack Light, Measure Right Tactical Guide provided ...
This Tactical Guide helps programs understand how software metrics offer insights into the health, effectiveness, and efficiency of the mission capability it develops. This Tactical Guide helps ...
Hutchison, S. (2021, August 9). DNS Over HTTPS: 3 Strategies for Enterprise Security Monitoring. Retrieved May 12, 2026, from https://www.sei.cmu.edu/blog/dns-over ...
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
The Architecture Tradeoff Analysis Method (ATAM) is a method for evaluating software architectures relative to quality attribute goals. ATAM evaluations expose architectural risks that potentially ...
Ozkaya, I., and Nord, R., 2019: Managing the Consequences of Technical Debt: 5 Stories from the Field. Carnegie Mellon University, Software Engineering Institute's ...
Brown, N., 2021: Taking DevSecOps to the Next Level with Value Stream Mapping. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Shevchenko, N., 2020: An Introduction to Model-Based Systems Engineering (MBSE). Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results