The SEI Digital Library houses thousands of technical papers and other documents, ranging from SEI Technical Reports on groundbreaking research to conference proceedings, survey results, and source ...
Scherlis, B., 2024: Weaknesses and Vulnerabilities in Modern AI: AI Risk, Cyber Risk, and Planning for Test and Evaluation. Carnegie Mellon University, Software ...
The individuals listed below have earned an SEI certificate and requested that the SEI include their information on this list. You can earn an SEI certificate by completing a set curriculum in a ...
Schmidt, D., and Robert, J., 2024: Applying Large Language Models to DoD Software Acquisition: An Initial Experiment. Carnegie Mellon University, Software Engineering ...
Klieber, W., 2021: A Technique for Decompiling Binary Code for Software Assurance and Localized Repair. Carnegie Mellon University, Software Engineering Institute's ...
Ozkaya, I., Carleton, A., Robert, J., and Schmidt, D., 2023: Application of Large Language Models (LLMs) in Software Engineering: Overblown Hype or Disruptive Change ...
Sherman, M., 2024: Using ChatGPT to Analyze Your Code? Not So Fast. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed November 3 ...
Improving Disaster Response with the xView2 Challenge Created July 22, 2020 • Updated March 17, 2025 The DoD’s Defense Innovation Unit, the SEI, and other organizations launched the xView2 Challenge ...
Hughes, L., and Jackson, V., 2021: A Framework for DevSecOps Evolution and Achieving Continuous-Integration/Continuous-Delivery (CI/CD) Capabilities. Carnegie Mellon ...
The Software Engineering Institute (SEI) is advancing the Department of Defense’s vision of creating viable, trusted, and extensible artificial intelligence (AI) systems by leading the development of ...
Established by the Department of Defense (DoD) in 1984, the Software Engineering Institute (SEI) began operation in early 1985. Since then, the SEI has shown that it both anticipates and responds to ...
To establish a computer security incident response team (CSIRT), you should understand what type of CSIRT is needed, the type of services that should be offered, the size of the CSIRT and where it ...
Resultaten die mogelijk niet toegankelijk zijn voor u worden momenteel weergegeven.
Niet-toegankelijke resultaten verbergen