Archive: 2019
System Resilience Part 2: How System Resilience Relates to Other Quality Attributes
To most people, a system is resilient if it continues to perform its mission in the face of adversity....
Read More•By Donald Firesmith
In Cybersecurity Engineering
Prioritizing Vulnerability Response with a Stakeholder-Specific Vulnerability Categorization
We've just released a follow-up paper in our research agenda about prioritizing actions during vulnerability management, Prioritizing Vulnerability Response: A Stakeholder-Specific Vulnerability Categorization....
Read More•By Allen D. Householder
In CERT/CC Vulnerabilities
AI Engineering: 11 Foundational Practices for Decision Makers
Artificial intelligence (AI) is driving advances throughout modern society, including in the fields of medicine, transportation, education, and finance....
Read More•By Ipek Ozkaya, Angela Horneman, Andrew O. Mellinger
In Artificial Intelligence Engineering
Measuring Resilience in Artificial Intelligence and Machine Learning Systems
Artificial intelligence (AI) and machine learning (ML) systems are quickly becoming integrated into a wide array of business and military operational environments....
Read More•By Alexander Petrilli, Shing-hon Lau
In Artificial Intelligence Engineering
Achieving the Quantum Advantage in Software
This blog post details an effort that focuses on near-term quantum computing for software verification and validation within the DoD.
Read More•By Jason Larkin, Daniel Justice
In Quantum Computing
4 Elements in Securing the Telecommunications Supply Chain
On September 27, 2019, the Subcommittee on Communications and Technology of the U.S. House of Representatives Committee on Energy and Commerce convened a hearing on "Legislating to Secure America's Wireless …
Read More•By Roberta (Bobbie) Stempfley
In Cybersecurity Engineering
The Vectors of Code: On Machine Learning for Software
This blog post provides a light technical introduction on machine learning (ML) for problems of computer code, such as detecting malicious executables or vulnerabilities in source code....
Read More•By Zachary Kurtz
In Artificial Intelligence Engineering
Machine Learning in Cybersecurity
Our technical report provides an overview of the relevant parts of an ML lifecycle--selecting the right problem, the right data, and the right math and summarizing the model output for …
Read More•By Jonathan Spring
In CERT/CC Vulnerabilities
SEI Blog Archive
Recent
Year