This systematic review discusses academic surveys, grey literature sources, and real-world case studies on securing LLM agents.
Drift in data and concept, evolving edge cases, and emerging phenomena can undermine the correlations that AI classifiers rely on. In this podcast, SEI researchers discuss a new tool to help improve ...
Wilson, S., Place, P., and Korzec, K., 2023: The Seven Virtues of Reconciling Agile and Earned Value Management (EVM). Carnegie Mellon University, Software ...
Morrow, T., and Nicolai, M., 2022: The Zero Trust Journey: 4 Phases of Implementation. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Complete the form below to register and download a free online copy of SEI CERT C Coding Standard: Rules for Developing Safe, Reliable, and Secure Systems (2016 Edition). Writing secure C code helps ...
Kartch, R., 2017: Best Practices for Network Border Protection. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed November 19 ...
This post outlines 5 essential questions to ask before implementing the Software Acquisition Pathway (SWP) and an SEI toolset to assist in the effort. It is essential that software and acquisition ...
SEI researchers discuss their work on System Theoretic Process Analysis, or STPA, a hazard-analysis technique uniquely suitable for dealing with AI complexity when assuring AI systems.
Spring, J., 2022: Probably Don’t Rely on EPSS Yet. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed November 19, 2025, https ...
Wassermann, G., and Svoboda, D., 2023: Rust Vulnerability Analysis and Maturity Challenges. Carnegie Mellon University, Software Engineering Institute's Insights ...
This collection contains resources about the Architecture Tradeoff Analysis Method (ATAM), a method for evaluating software architectures against quality attribute goals. The Architecture Tradeoff ...
Dormann, W., 2016: Windows 10 Cannot Protect Insecure Applications Like EMET Can. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results