This podcast explores radio frequency attacks, such as those conducted by APT28, and how software and cybersecurity play key roles in preventing and mitigating these exploitations.
Wilson, S., Place, P., and Korzec, K., 2023: The Seven Virtues of Reconciling Agile and Earned Value Management (EVM). Carnegie Mellon University, Software ...
Swinton, S., and Hedges, S., 2019: Cybersecurity Governance, Part 1: 5 Fundamental Challenges. Carnegie Mellon University, Software Engineering Institute's Insights ...
Firesmith, D., 2012: The Need to Specify Requirements for Off-Nominal Behavior. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Snoke, T., 2017: Best Practices for NTP Services. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 3, 2025, https://www ...
Costa, D., 2020: Organizational Resilience to Insider Threats. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed November 27 ...
Giobbi, R., 2008: Ping Sweeping in IPv6. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 4, 2025, https://www.sei.cmu ...
This systematic review discusses academic surveys, grey literature sources, and real-world case studies on securing LLM agents.
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Ultra-Large-Scale Systems: The Software Challenge of the Future is the product of a 12-month study of ultra-large-scale (ULS) systems software. The study brought together experts in software and other ...
Brown, N., 2021: Taking DevSecOps to the Next Level with Value Stream Mapping. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results