The study explores the risks and tradeoffs when adapting enterprise-IT security and zero trust principles to weapon systems.
This technical note explores MVAs and offers guidance on what teams should do with an MVA to get their certificate to field and authorization to operate. This technical note explores the concept of ...
Turri, V., 2022: What is Explainable AI?. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed October 22, 2025, https://www.sei.cmu ...
In this webcast, Brett Tucker, Dan Justice, and Matthew Butkovic discuss the challenges to be expected with the realization of quantum computing capabilities.
At the November event, co-organized by the SEI, artificial intelligence experts will present case studies and research and development in building AI systems for safety-critical applications.
The October 23 virtual workshop will feature presentations on dataset generation, exploration, preparation, and testing for ensuring data quality when training AI systems.
Spring, J., 2022: Probably Don’t Rely on EPSS Yet. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed October 14, 2025, https ...
Shevchenko, N., 2020: An Introduction to Model-Based Systems Engineering (MBSE). Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
This book offers specific guidance and countermeasures on insider threat that can be immediately applied within any private, government, or military organization. Since 2001, the CERT® Insider Threat ...
Sarvepalli, V., 2023: UEFI: 5 Recommendations for Securing and Restoring Trust. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results