Archive: 2019
System Resilience Part 2: How System Resilience Relates to Other Quality Attributes
To most people, a system is resilient if it continues to perform its mission in the face of adversity....
• By Donald Firesmith
In Cybersecurity Engineering
![Headshot of Donald Firesmith](/media/images/thumb_big_d-firesmith_blog_auth.max-180x180.format-webp.webp)
Prioritizing Vulnerability Response with a Stakeholder-Specific Vulnerability Categorization
We've just released a follow-up paper in our research agenda about prioritizing actions during vulnerability management, Prioritizing Vulnerability Response: A Stakeholder-Specific Vulnerability Categorization....
• By Allen D. Householder
In CERT/CC Vulnerabilities
![Headshot of Allen Householder](/media/images/thumb_big_a-householder_blog_au.max-180x180.format-webp.webp)
AI Engineering: 11 Foundational Practices for Decision Makers
Artificial intelligence (AI) is driving advances throughout modern society, including in the fields of medicine, transportation, education, and finance....
• By Ipek Ozkaya, Angela Horneman, Andrew O. Mellinger
In Artificial Intelligence Engineering
![Headshot of Ipek Ozkaya.](/media/images/thumb_big_i-ozkaya_blog_authors.max-180x180.format-webp.webp)
Measuring Resilience in Artificial Intelligence and Machine Learning Systems
Artificial intelligence (AI) and machine learning (ML) systems are quickly becoming integrated into a wide array of business and military operational environments....
• By Alexander Petrilli, Shing-hon Lau
In Artificial Intelligence Engineering
![Alexander Petrilli](/media/images/thumb_big_a-petrilli_blog_autho.max-180x180.format-webp.webp)
![Headshot of Shing-hon Lau.](/media/images/thumb_big_s-lau_blog_authors_56.max-180x180.format-webp.webp)
Achieving the Quantum Advantage in Software
This blog post details an effort that focuses on near-term quantum computing for software verification and validation within the DoD.
• By Jason Larkin, Daniel Justice
In Quantum Computing
![Jason Larkin](/media/images/thumb_big_j-larkin_blog_authors.max-180x180.format-webp.webp)
![Daniel Justice](/media/images/thumb_big_d-justice_blog_author.max-180x180.format-webp.webp)
4 Elements in Securing the Telecommunications Supply Chain
On September 27, 2019, the Subcommittee on Communications and Technology of the U.S. House of Representatives Committee on Energy and Commerce convened a hearing on "Legislating to Secure America's Wireless …
• By Roberta (Bobbie) Stempfley
In Cybersecurity Engineering
The Vectors of Code: On Machine Learning for Software
This blog post provides a light technical introduction on machine learning (ML) for problems of computer code, such as detecting malicious executables or vulnerabilities in source code....
• By Zachary Kurtz
In Artificial Intelligence Engineering
![Zachary Kurtz](/media/images/thumb_big_z-kurtz_blog_authors_.max-180x180.format-webp.webp)
Machine Learning in Cybersecurity
Our technical report provides an overview of the relevant parts of an ML lifecycle--selecting the right problem, the right data, and the right math and summarizing the model output for …
• By Jonathan Spring
In CERT/CC Vulnerabilities
SEI Blog Archive
Recent
Year