Latest Additions to the Library
Cloud Computing at the Tactical Edge
This technical note presents a strategy to overcome the challenges of obtaining sufficient computation power to run applications needed for warfighting and disaster relief missions. It discusses the use of...
COVERT: A Framework for Finding Buffer Overflows in C Programs via Software Verification
This report presents COVERT, an automated framework aimed at finding buffer overflows in C programs using state-of-the-art software verification tools and techniques.
Evaluating and Mitigating Software Supply Chain Security Risks
This 2010 report identifies software supply chain security risks and specifies the evidence that must be gathered to determine whether these risks have been mitigated.
Engineering Safety-and Security-Related Requirements for Software-Intensive Systems (ICSE 2010)
presentation given at the 32nd International Conference on Software Engineering 4 May 2010
Agile Development & Software Architecture - Crossing the Great Divide (Webinar)
In this webinar, we will take a journey to each camp to dispel misconceptions and discuss how Agilists and Architects can learn from and benefit each other.