Human-Machine Interactions
Blog Posts
Six Dimensions of Trust in Autonomous Systems
This post chronicles the adoption and growth of autonomous systems and provides six considerations for establishing trust.
• By Paul D. Nielsen
In Software Engineering Research and Development

Expectations for Implementing DevOps in a Highly Regulated Environment: Second in a Series
This second installment in the blog post series on implementing DevOps in highly regulated environments (HREs), which is excerpted from a recently published paper, discusses the first step in a …
• By Jose Morales
In DevSecOps

Best Practices in Network Traffic Analysis: Three Perspectives
In July of this year, a major overseas shipping company had its U.S. operations disrupted by a ransomware attack, one of the latest attacks to disrupt the daily operation of …
• By Angela Horneman, Tim Shimeall, Timur Snoke
In Situational Awareness

Obsidian: A New, More Secure Programming Language for Blockchain
Billions of dollars in venture capital, industry investments, and government investments are going into the technology known as blockchain....
• By Eliezer Kanal
In Secure Development

Introducing Atlas: A Prototype for Visualizing the Internet
After 30 years, cyber command centers, educators, and Internet threat intelligence organizations have yet to embrace a standardized, encompassing, and intuitive way to represent the entities and activities of the …
• By Douglas Gardner

Best Practices for Cloud Security
As detailed in last week's post, SEI researchers recently identified a collection of vulnerabilities and risks faced by organizations moving data and applications to the cloud....
• By Donald Faatz
In Cloud Computing

Revealing True Emotions Through Micro-Expressions: A Machine Learning Approach
Micro-expressions--involuntary, fleeting facial movements that reveal true emotions--hold valuable information for scenarios ranging from security interviews and interrogations to media analysis....
• By Satya Venneti
In Artificial Intelligence Engineering

Machine Learning and Insider Threat
As organizations' critical assets have become digitized and access to information has increased, the nature and severity of threats has changed. Organizations' own personnel--insiders--now have greater ability than ever before …
• By Daniel Costa
In Artificial Intelligence Engineering

What Is Bitcoin? What Is Blockchain?
Blockchain technology was conceived a little over ten years ago. In that short time, it went from being the foundation for a relatively unknown alternative currency to being the "next …
• By Eliezer Kanal

Machine Learning in Cybersecurity
In this post I introduce the concept of machine learning, explain how machine learning is applied in practice, and touch on its application to cybersecurity throughout the article.
• By Eliezer Kanal
In Artificial Intelligence Engineering
