This podcast explores radio frequency attacks, such as those conducted by APT28, and how software and cybersecurity play key roles in preventing and mitigating these exploitations.
This systematic review discusses academic surveys, grey literature sources, and real-world case studies on securing LLM agents.
Tobar, D., Jamieson, J., Priest, M., and Fricke, J., 2025: 7 Recommendations to Improve SBOM Quality. Carnegie Mellon University, Software Engineering Institute's ...
Gallagher, S., Rallapalli, S., and Brooks, T., 2025: Evaluating LLMs for Text Summarization: An Introduction. Carnegie Mellon University, Software Engineering ...
Shevchenko, N., 2018: Threat Modeling: 12 Available Methods. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 3, 2025 ...
In this webcast, Justin Smith highlights a novel approach to providing independent verification and validation (IV&V) for projects that are using an Agile or iterative software development.
Shevchenko, N., 2024: An Introduction to Model-Based Systems Engineering (MBSE). Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Sherman, M., 2024: Using ChatGPT to Analyze Your Code? Not So Fast. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 3 ...
Robert, J., and Schmidt, D., 2024: 10 Benefits and 10 Challenges of Applying Large Language Models to DoD Software Acquisition. Carnegie Mellon University, Software ...
Mead, N., Woody, C., and Hissam, S., 2024: Measurement Challenges in Software Assurance and Supply Chain Risk Management. Carnegie Mellon University, Software ...
Schmidt, D., and Robert, J., 2024: Applying Large Language Models to DoD Software Acquisition: An Initial Experiment. Carnegie Mellon University, Software Engineering ...
Novak, W., 2023: Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Clinging to the Old Ways. Carnegie Mellon University, Software Engineering Institute's ...