SARD: Thousands of Reference Programs for Software Assurance
One way to understand the strengths and limitations of software assurance tools is to use a corpus of programs with…
CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.
One way to understand the strengths and limitations of software assurance tools is to use a corpus of programs with…
Greetings, it is my honor to introduce the second of two special software assurance (SwA) editions of the Journal of…
This paper is a result of a cyber risk assessment undertaken with the goal of increasing the cyber awareness of…
Quanterion Solutions is thrilled to be competitively selected to operate the Department of Defense (DoD) Cyber Security and Information Systems…
The Air Force Research Laboratory (AFRL) is fortunate to have one of its subject matter experts (SMEs) working hand-in-hand with…
On January 28th, 2011, Egypt disappeared from the global map. In a coordinated shutdown of all major Egyptian internet service…
Once upon a time, a brave knight was entrusted with the guarding of a valuable treasure. An evil wizard had…
Biometrics is the “something you are” identity factor used in authentication and identification systems. Organizations that rely on biometric technology…
Just a few short months ago on July 1st, 2012 the new Cyber Security and Information Systems Information Analysis Center…
This paper summarizes the progress various industries have made in software productivity during the first decade of the 21st century….
The role of software acquisition ecosystems in the development and evolution of secure open architecture systems has received insufficient consideration….
In this article, we discuss the development and transition of the Software Engineering Institute’s (SEI’s) Software Assurance Curriculum. The Master…