Turri, V., Schieber, N., Loughin, C., and Brooks, T., 2026: The ELM Library: An LLM Evaluation Toolset. Carnegie Mellon University, Software Engineering Institute's ...
Dormann, W., 2019: The Dangers of VHD and VHDX Files. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed May 13, 2026, https://www ...
Published between 1997 and 2006, CERT Tech Tips helped organizations and individuals navigate security concerns and provided answers to frequently asked questions.
Gardner, C., 2017: Establishing Baseline Behaviors (Part 14 of 20: CERT Best Practices to Mitigate Insider Threats Series). Carnegie Mellon University, Software ...
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Shevchenko, N., 2020: An Introduction to Model-Based Systems Engineering (MBSE). Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Walsh, M., 2024: A Framework for Detection in an Era of Rising Deepfakes. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed May ...
The Architecture Tradeoff Analysis Method (ATAM) is a method for evaluating software architectures relative to quality attribute goals. ATAM evaluations expose architectural risks that potentially ...
Software is vital to our country’s global competitiveness, innovation, and national security. It also ensures our modern standard of living and enables continued advances in defense, infrastructure, ...
This book provides an easily accessible overview of software architecture. Anyone requiring a comprehensive overview of the software architecture field will benefit from this book. This book provides ...
This document contains the CERT advisories from 1988.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results