Latest Additions to the Library
Application Virtualizaton as a Strategy for Cyber Foraging in Resource-Constrained Environments
This technical note explores the applicability of application virtualization as a strategy for cyber foraging in resource-constrained environments. Cyber foraging is a technique to enable resource-poor, mobile devices to leverage...
This report presents methods to audit USB device use within a Microsoft Windows environment.
Reliability Improvement and Validation Framework
This report discusses the reliability validation and improvement framework developed by the SEI. The purpose of this framework is to provide a foundation for addressing the challenges of qualifying increasingly...
Cloud Computing at the Tactical Edge
This technical note presents a strategy to overcome the challenges of obtaining sufficient computation power to run applications needed for warfighting and disaster relief missions. It discusses the use of...
Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector
This report describes a new insider threat study in which researchers extracted technical and behavioral patterns from fraud cases and developed insights and risk indicators of malicious insider activity within...