The study explores the risks and tradeoffs when adapting enterprise-IT security and zero trust principles to weapon systems.
DeCapria, D., 2025: DataOps: Towards More Reliable Machine Learning Systems. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Schmidt, D., and Sledge, C., 2016: A Naval Perspective on Open-Systems Architecture. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Cassidy, T., and CERT Insider Threat Center, T., 2018: Substance Use and Abuse: Potential Insider Threat Implications for Organizations. Carnegie Mellon University ...
The SEI is participating at the SciTech Forum 2026 ...
Critical Asset Identification (Part 1 of 20: CERT Best Practices to Mitigate Insider Threats Series)
Ruefle, R., 2017: Critical Asset Identification (Part 1 of 20: CERT Best Practices to Mitigate Insider Threats Series). Carnegie Mellon University, Software ...
Schmidt, D., and Robert, J., 2024: Applying Large Language Models to DoD Software Acquisition: An Initial Experiment. Carnegie Mellon University, Software Engineering ...
Sherman, M., 2024: Using ChatGPT to Analyze Your Code? Not So Fast. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed October 27 ...
Faatz, D., 2018: Best Practices for Cloud Security. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed October 22, 2025, https ...
Hughes, L., and Jackson, V., 2021: A Framework for DevSecOps Evolution and Achieving Continuous-Integration/Continuous-Delivery (CI/CD) Capabilities. Carnegie Mellon ...
Robert, J., and Schmidt, D., 2024: 10 Benefits and 10 Challenges of Applying Large Language Models to DoD Software Acquisition. Carnegie Mellon University, Software ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results