<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url><loc>https://www.sei.cmu.edu/library/a-research-perspective-on-maintenance-and-reengineering-of-service-oriented-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-in-c-and-c-an-interview-with-robert-seacord-for-linuxworld/</loc></url><url><loc>https://www.sei.cmu.edu/library/variadic-functions-how-they-contribute-to-security-vulnerabilities-and-how-to-fix-them/</loc></url><url><loc>https://www.sei.cmu.edu/library/making-architecture-visible-to-improve-flow-management-in-lean-software-development/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/integrate-end-to-end-early-and-often/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architectural-tactics-to-support-rapid-and-agile-stability/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecting-for-large-scale-agile-development-a-risk-driven-approach/</loc><lastmod>2026-01-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/enabling-agility-through-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecting-for-sustainable-software-delivery/</loc></url><url><loc>https://www.sei.cmu.edu/library/distribution-data-deployment-software-architecture-convergence-in-big-data-systems/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/resilience-management-through-the-use-of-cert-rmm-and-associated-success-stories/</loc></url><url><loc>https://www.sei.cmu.edu/library/silent-elimination-of-bounds-checks/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/c-secure-coding-rules-past-present-and-future/</loc><lastmod>2024-04-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/accessing-shared-atomic-objects-from-within-a-signal-handler-in-c/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/preface-to-the-cert-c-coding-standard-second-edition/</loc><lastmod>2024-06-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/java-coding-guidelines-for-reliability/</loc><lastmod>2024-04-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-in-c-and-c-strings-and-buffer-overflows/</loc><lastmod>2024-06-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-cert-oracle-secure-coding-standard-for-java-input-validation-and-data-sanitization/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-in-c-and-c-an-interview-with-robert-seacord/</loc><lastmod>2024-03-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/robert-seacord-on-the-cert-c-secure-coding-standard/</loc><lastmod>2024-06-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-standards/</loc><lastmod>2024-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/programming-language-format-string-vulnerabilities/</loc><lastmod>2026-01-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-role-of-cloudlets-in-hostile-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/exploring-a-mechanistic-approach-to-experimentation-in-computing/</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/guest-editorial-preface-for-2013-special-issue-of-the-international-journal-of-secure-software-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/development-of-a-master-of-software-assurance-reference-curriculum-2010-ijsse/</loc></url><url><loc>https://www.sei.cmu.edu/library/considering-operational-security-risk-during-system-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/hipaa-and-information-security-risk-implementing-an-enterprise-wide-risk-management-strategy/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/toward-realistic-modeling-criteria-of-games-in-internet-security/</loc><lastmod>2023-11-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-long-taile-of-typosquatting-domain-names/</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/recovering-c-objects-from-binaries-using-inter-procedural-data-flow-analysis/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/binary-function-clustering-using-semantic-hashes/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-scalable-search-index-for-binary-files/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/supervised-learning-for-provenance-similarity-of-binaries/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/discovery-of-c-data-structures-from-binaries/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cc-thread-safety-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/technical-debt-at-the-crossroads-of-research-and-practice-report-on-the-fifth-international-workshop-on-managing-technical-debt/</loc></url><url><loc>https://www.sei.cmu.edu/library/technical-debt-towards-a-crisper-definition-report-on-the-4th-international-workshop-on-managing-technical-debt/</loc></url><url><loc>https://www.sei.cmu.edu/library/technical-debt-in-software-development-from-metaphor-to-theory-report-on-the-third-international-workshop-on-managing-technical-debt/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/managing-technical-debt-in-software-development-report-on-the-2nd-international-workshop-on-managing-technical-debt/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-practice-and-future-of-release-engineering-a-roundtable-with-three-release-engineers/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-ieee-cybersecurity-initiative-accelerating-innovation-in-security-privacy-technologies-video/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/toward-simpler-not-simplistic-quantification-of-software-architecture-and-metrics-report-on-the-second-international-workshop-on-software-architecture-and-metrics/</loc></url><url><loc>https://www.sei.cmu.edu/library/dynamics-of-software-sustainment/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/smartphone-security/</loc><lastmod>2024-04-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/model-based-engineering-for-supply-chain-risk-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-makes-an-architect-successful/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyburgh-pa-using-process-to-tame-technology/</loc><lastmod>2023-10-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyburgh-pa-solving-the-workforce-shortfall-in-cybersecurity/</loc><lastmod>2023-10-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyburgh-pa-using-technology-wisely-to-protect-your-organization/</loc><lastmod>2023-10-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/reducing-friction-in-software-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-uniform-approach-for-system-of-systems-architecture-evaluation/</loc><lastmod>2023-10-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-method-and-case-study-for-using-malware-analysis-to-improve-security-requirements/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-the-special-issue-on-insider-threat-modeling-and-simulation/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-agent-based-approach-to-modeling-insider-threat/</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/inadvertent-leaks-exploration-via-agent-based-dynamic-network-simulation/</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/compliance-signaling-games-toward-modeling-the-deterrence-of-insider-threats/</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-dynamic-models-to-support-inferences-of-insider-threat-risk/</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/giant-slayer-will-you-let-software-be-david-to-your-goliath-system/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/beyond-scrum-xp-agile-architecture-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecting-for-sustainable-software-delivery-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-principled-way-to-use-frameworks-in-architecture-design/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-to-agilely-architect-an-agile-architecture/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2015-state-of-cybercrime-survey/</loc></url><url><loc>https://www.sei.cmu.edu/library/graduate-curricula-in-software-engineering-and-software-assurance-need-and-recommendations/</loc></url><url><loc>https://www.sei.cmu.edu/library/assessing-dod-system-acquisition-supply-chain-risk-management/</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-viewpoint-for-system-architecture-documentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/modeling-software-sustainment/</loc><lastmod>2024-01-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/engaging-the-community-strategies-for-software-assurance-curricula-outreach/</loc><lastmod>2024-01-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/where-to-integrate-security-practices-on-devops-platform/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/making-the-case-for-army-data-scientists/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-cyber-data-science-process/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-logic-programming-to-recover-c-classes-and-methods-from-compiled-executables/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-cots-and-software-reuse-teach-us-about-soa/</loc></url><url><loc>https://www.sei.cmu.edu/library/developing-realistic-approaches-for-the-migration-of-legacy-components-to-service-oriented-architecture-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/roles-for-maintenance-and-evolution-of-soa-based-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/enabling-predictable-assembly/</loc></url><url><loc>https://www.sei.cmu.edu/library/cloud-increases-the-role-of-acquisition-in-cybersecurity/</loc><lastmod>2026-01-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-pipeline-for-complex-software-intensive-systems-addressing-cybersecurity-challenges/</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/twinops-devops-meets-model-based-engineering-and-digital-twins-for-the-engineering-of-cps/</loc></url><url><loc>https://www.sei.cmu.edu/library/toward-model-based-embedded-system-validation-through-virtual-integration/</loc><lastmod>2023-10-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/authentication-and-authorization-for-iot-devices-in-disadvantaged-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/optimization-of-software-release-planning-considering-architectural-dependencies-cost-and-value/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-learning-suite-essential-service-practices/</loc></url><url><loc>https://www.sei.cmu.edu/library/smart-soa-migration-adoption-and-reuse-technique/</loc></url><url><loc>https://www.sei.cmu.edu/library/author-interview-system-architecture-virtual-integration-an-industrial-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-smart-grid-managing-electrical-power-distribution-and-use/</loc></url><url><loc>https://www.sei.cmu.edu/library/evaluating-service-oriented-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/groundbreaking-best-practices-model-for-acquiring-it-technical-products-and-services/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/improving-software-architecture-competence/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/best-practices-in-software-architecture/</loc><lastmod>2024-01-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/documenting-software-architectures-podcast/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-cyber-risk-insurance-symposium-overview/</loc><lastmod>2025-09-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-adventures-of-ricky-and-stick/</loc><lastmod>2024-03-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-in-practice-third-edition/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/model-based-engineering-with-aadl-an-introduction-to-the-sae-architecture-analysis-design-language/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-cert-guide-to-insider-threats-how-to-prevent-detect-and-respond-to-information-technology-crimes-theft-sabotage-fraud/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-cert-oracle-secure-coding-standard-for-java/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/leadership-teamwork-and-trust-building-a-competitive-software-capability/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-resilience-management-model-a-maturity-model-for-managing-operational-resilience/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/documenting-software-architectures-views-and-beyond-second-edition/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/integrating-cmmi-and-agile-development-case-studies-and-proven-techniques-for-faster-performance-improvement/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/reflections-on-management-how-to-manage-your-software-projects-your-teams-your-boss-and-yourself/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-people-cmm-a-framework-for-human-capital-management-2nd-edition/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-c-secure-coding-standard/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-security-engineering-a-guide-for-project-managers-book/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-and-six-sigma-partners-in-process-improvement/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-for-outsourcing-guidelines-for-software-systems-and-it-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/perspectives-on-free-and-open-source-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-process-research-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-survival-guide-just-enough-process-improvement/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ultra-large-scale-systems-the-software-challenge-of-the-future/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-coaching-development-teams/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-in-c-and-c/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-leading-a-development-team/</loc></url><url><loc>https://www.sei.cmu.edu/library/estimating-software-intensive-systems-projects-products-and-processes/</loc></url><url><loc>https://www.sei.cmu.edu/library/psp-a-self-improvement-process-for-software-engineers/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-scampi-distilled-appraisals-for-process-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-assessments-motivating-positive-change/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/internet-denial-of-service-attack-and-defense-mechanisms/</loc></url><url><loc>https://www.sei.cmu.edu/library/principles-of-case-tool-integration/</loc><lastmod>2025-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/human-aspects-of-software-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-in-practice-2nd-edition/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/modernizing-legacy-systems-software-technologies-engineering-processes-and-business-practices/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/managing-information-security-risks-the-octave-approach/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-centric-software-project-management-a-practical-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/winning-with-software-an-executive-strategy/</loc></url><url><loc>https://www.sei.cmu.edu/library/evaluating-software-architectures-methods-and-case-studies/</loc><lastmod>2025-02-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-product-lines-practices-and-patterns/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-software-acquisition-open-systems-and-cots-products/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-distilled-a-practical-introduction-to-integrated-process-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-guide-to-system-and-network-security-practices/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmm-in-practice-processes-for-executing-software-projects-at-infosys/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-the-team-software-process/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measuring-the-software-process-statistical-process-control-for-software-process-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/cleanroom-software-engineering-technology-and-process/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-process-improvement-practical-guidelines-for-business-success/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/managing-risk-methods-for-software-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-the-personal-software-process/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-technical-people-innovation-teamwork-and-the-software-process/</loc></url><url><loc>https://www.sei.cmu.edu/library/continuous-risk-management-guidebook/</loc><lastmod>2024-02-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/discipline-for-software-engineering-the-complete-psp-book/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-design-methods-for-concurrent-and-real-time-systems/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/managing-the-software-process/</loc></url><url><loc>https://www.sei.cmu.edu/library/developing-software-for-the-user-interface/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-practitioners-handbook-for-real-time-analysis-guide-to-rate-monotonic-analysis-for-real-time-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-systems-from-commercial-components/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-for-services-guidelines-for-superior-service-second-edition/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-for-acquisition-guidelines-for-improving-the-acquisition-of-products-and-services-second-edition/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-for-development-guidelines-for-process-integration-and-product-improvement-third-edition/</loc></url><url><loc>https://www.sei.cmu.edu/library/java-coding-guidelines-75-recommendations-for-reliable-and-secure-programs/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-cert-c-coding-standard-98-rules-for-developing-safe-reliable-and-secure-systems-second-edition/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-information-security-a-strategic-based-approach/</loc></url><url><loc>https://www.sei.cmu.edu/library/devops-a-software-architects-perspective/</loc></url><url><loc>https://www.sei.cmu.edu/library/designing-software-architectures-a-practical-approach/</loc><lastmod>2025-02-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-security-engineering-a-practical-approach-for-systems-and-software-assurance/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-physical-systems/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/history-of-innovation-at-the-sei/</loc><lastmod>2025-08-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/managing-technical-debt-reducing-friction-in-software-development/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-science-in-cybersecurity/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-in-practice-fourth-edition/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecting-the-future-of-software-engineering-a-national-agenda-for-software-engineering-research-development/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/creating-and-using-virtual-prototyping-software-principles-and-practices/</loc><lastmod>2025-01-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sample-chapter-from-secure-coding-in-c-and-c-integer-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/sample-chapter-from-secure-coding-in-c-and-c-foreword/</loc></url><url><loc>https://www.sei.cmu.edu/library/sample-chapter-from-secure-coding-in-c-and-c-index/</loc></url><url><loc>https://www.sei.cmu.edu/library/principles-and-measurement-models-for-software-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/combining-security-and-privacy-in-requirements-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/novel-methods-of-incorporating-security-requirements-engineering-into-software-engineering-courses/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/identifying-security-requirements-using-the-security-quality-requirements-engineering-square-method-information-security-and-ethics/</loc></url><url><loc>https://www.sei.cmu.edu/library/identifying-security-requirements-using-the-security-quality-requirements-engineering-square-method-integrating-security-and-software-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/recommended-practices-chapter-from-secure-coding-in-c-and-c/</loc><lastmod>2023-06-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/asset-definition-and-management-adm-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/access-management-am-cert-rmm-process-area/</loc><lastmod>2024-03-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/communications-comm-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/compliance-comp-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/controls-management-ctrl-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/environmental-control-ec-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/enterprise-focus-ef-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/external-dependencies-management-exd-cert-rmm-process-area/</loc><lastmod>2024-03-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/financial-resource-management-frm-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/human-resource-management-hrm-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/identity-management-id-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/incident-management-and-control-imc-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/knowledge-and-information-management-kim-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/measurement-and-analysis-ma-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/monitoring-mon-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/organizational-process-definition-opd-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/organizational-process-focus-opf-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/organizational-training-and-awareness-ota-cert-rmm-process-area/</loc><lastmod>2024-04-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/people-management-pm-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/risk-management-risk-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/resilience-requirements-development-rrd-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/resilience-requirements-management-rrm-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/resilient-technical-solution-engineering-rtse-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/service-continuity-sc-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/technology-management-tm-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/vulnerability-analysis-and-resolution-var-cert-rmm-process-area/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-rmm-generic-goals-and-practices/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-rmm-acronyms-and-initialisms/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-rmm-glossary-of-terms/</loc></url><url><loc>https://www.sei.cmu.edu/library/2010-cert-research-report/</loc><lastmod>2026-04-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/supply-chain-assurance-overview/</loc></url><url><loc>https://www.sei.cmu.edu/library/measuring-software-security-assurance-overview/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-security-assurance-overview/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-assured-systems-framework-basf-overview/</loc></url><url><loc>https://www.sei.cmu.edu/library/2009-cert-research-report/</loc><lastmod>2026-04-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2005-cert-research-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/2006-cert-research-report/</loc><lastmod>2026-04-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2007-cert-research-report/</loc><lastmod>2026-04-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2008-cert-research-report/</loc><lastmod>2026-04-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cert-c-coding-standard-rules-for-developing-safe-reliable-and-secure-systems-2016-edition/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cert-c-coding-standard-rules-for-developing-safe-reliable-and-secure-systems-2016-edition-2/</loc><lastmod>2025-07-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/analysis-and-management-of-architectural-dependencies-in-iterative-release-planning/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-driven-performance-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/performance-analysis-of-real-time-component/</loc></url><url><loc>https://www.sei.cmu.edu/library/optimized-l-based-assume-guarantee-reasoning/</loc><lastmod>2024-06-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/creating-custom-containers-with-generative-techniques/</loc></url><url><loc>https://www.sei.cmu.edu/library/measuring-assurance-case-confidence-using-baconian-probabilities/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/anomaly-based-botnet-server-detection/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/eliminative-induction-a-basis-for-arguing-system-confidence/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/predicting-future-botnet-addresses-with-uncleanliness/</loc></url><url><loc>https://www.sei.cmu.edu/library/more-netflow-tools-for-performance-and-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/in-search-of-a-metric-for-managing-architectural-technical-debt/</loc></url><url><loc>https://www.sei.cmu.edu/library/elaboration-on-an-integrated-architecture-and-requirement-practice/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-study-of-enabling-factors-for-rapid-fielding/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-notation-for-describing-the-steps-in-indicator-expansion/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-implementation-of-the-behavior-annex-in-the-aadl-toolset-osate2/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/managing-technical-debt-in-software-reliant-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/modeling-malicious-domain-name-take-down-dynamics-why-ecrime-pays/</loc></url><url><loc>https://www.sei.cmu.edu/library/understanding-the-role-of-constraints-on-architecturally-significant-requirements/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/variations-on-using-propagation-costs-to-measure-architecture-modifiabilty-properties/</loc><lastmod>2023-11-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/pointer-ownership-model/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/android-taint-flow-analysis-for-app-sets/</loc></url><url><loc>https://www.sei.cmu.edu/library/probabilistic-verification-of-coordinated-multi-robot-missions/</loc></url><url><loc>https://www.sei.cmu.edu/library/towards-a-quantitative-method-for-assuring-coordinated-autonomy/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/unintentional-insider-threats-a-review-of-phishing-and-malware-incidents-by-economic-sector/</loc></url><url><loc>https://www.sei.cmu.edu/library/test-and-evaluation-of-autonomous-multi-robot-systems/</loc><lastmod>2025-08-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/on-developing-user-interfaces-for-piloting-unmanned-systems/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-patterns-for-mobile-systems-in-resource-constrained-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/toward-design-decisions-to-enable-deployability-empirical-study-of-three-projects-reaching-for-the-continuous-delivery-holy-grail/</loc></url><url><loc>https://www.sei.cmu.edu/library/silk-a-tool-suite-for-unsampled-network-flow-analysis-at-scale/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2010-proceedings/</loc><lastmod>2024-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2009-proceedings/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2008-proceedings/</loc></url><url><loc>https://www.sei.cmu.edu/library/best-practices-against-insider-threats-in-all-nations/</loc></url><url><loc>https://www.sei.cmu.edu/library/four-insider-it-sabotage-mitigation-patterns-and-an-initial-effectiveness-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/identifying-a-shared-mental-model-among-incident-responders/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-reference-architecture-for-mobile-code-offload-in-hostile-environments/</loc><lastmod>2025-06-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/design-research-in-the-context-of-federal-law-enforcement/</loc></url><url><loc>https://www.sei.cmu.edu/library/architectural-dependency-analysis-to-understand-rework-costs-for-safety-critical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-ontology-for-insider-threat-indicators/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-incident-management-ontology/</loc></url><url><loc>https://www.sei.cmu.edu/library/on-demand-vm-provisioning-for-cloudlet-based-cyber-foraging-in-resource-constrained-environments/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tactical-cloudlets-moving-cloud-computing-to-the-edge/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-reference-architecture-for-group-context-aware-mobile-applications/</loc></url><url><loc>https://www.sei.cmu.edu/library/industryuniversity-collaboration-in-software-engineering-education-refreshing-and-retuning-our-strategies/</loc></url><url><loc>https://www.sei.cmu.edu/library/global-adversarial-capability-modeling/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-course-based-usability-analysis-of-cilk-plus-and-openmp/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measure-it-manage-it-ignore-it-software-practitioners-and-technical-debt/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-in-distress-architecture-to-the-rescue/</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/evolutionary-improvements-of-cross-cutting-concerns-performance-in-practice/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/blacklist-ecosystem-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/application-specific-evaluation-of-no-sql-databases/</loc></url><url><loc>https://www.sei.cmu.edu/library/dynamic-parallelism-for-simple-and-efficient-gpu-graph-algorithms/</loc></url><url><loc>https://www.sei.cmu.edu/library/got-technical-debt-surfacing-elusive-technical-debt-in-issue-trackers/</loc><lastmod>2023-10-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-malware-analysis-to-improve-security-requirements-on-future-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-knowledge-for-evaluating-scalable-databases/</loc></url><url><loc>https://www.sei.cmu.edu/library/performance-evaluation-of-nosql-databases-a-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/runtime-performance-challenges-in-big-data-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/design-assistant-for-nosql-technology-selection/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-reference-architecture-for-big-data-systems-in-the-national-security-domain/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-code-repair-based-on-inferred-specifications/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-study-of-systems-engineering-effectiveness-initial-results/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/static-analysis-alert-audits-lexicon-rules/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-technical-debt-in-software-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/missed-architectural-dependencies-the-elephant-in-the-room/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-driven-observability-for-big-data-storage/</loc></url><url><loc>https://www.sei.cmu.edu/library/verbalization-narration-of-autonomous-robot-experience/</loc></url><url><loc>https://www.sei.cmu.edu/library/efficient-decision-making-under-uncertainty-for-proactive-self-adaptation/</loc></url><url><loc>https://www.sei.cmu.edu/library/certifiable-runtime-assurance-of-distributed-real-time-systems/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/what-to-fix-distinguishing-between-design-and-non-design-rules-in-automated-tools/</loc><lastmod>2023-10-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/testing-in-a-non-deterministic-world/</loc></url><url><loc>https://www.sei.cmu.edu/library/creating-software-modernization-roadmaps-the-architecture-options-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/input-attribution-for-statistical-model-checking-using-logistic-regression/</loc></url><url><loc>https://www.sei.cmu.edu/library/analysis-and-design-of-safety-critical-cyber-physical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-fault-tree-analysis-from-aadl-models/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/contract-based-verification-of-timing-enforcers/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/modeling-verifying-and-generating-software-for-distributed-cyber-physical-systems-using-dmpl-and-aadl/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-stakeholder-preferences-to-make-better-architecture-decisions/</loc></url><url><loc>https://www.sei.cmu.edu/library/shorter-reasoning-about-larger-requirements-models/</loc></url><url><loc>https://www.sei.cmu.edu/library/social-network-dynamics-of-insider-threats-a-preliminary-model/</loc><lastmod>2023-10-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/verifying-cyber-physical-systems-by-combining-software-model-checking-with-hybrid-systems-reachability/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/high-assurance-for-distributed-cyber-physical-systems/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/optimizing-seed-selection-for-fuzzing/</loc></url><url><loc>https://www.sei.cmu.edu/library/joint-common-architecture-jca-demonstration-architecture-centric-virtual-integration-process-acvip-shadow-effort/</loc><lastmod>2026-01-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/model-checking-with-multi-threaded-ic3-portfolios/</loc></url><url><loc>https://www.sei.cmu.edu/library/dynamic-generation-and-refinement-of-robot-verbalization/</loc></url><url><loc>https://www.sei.cmu.edu/library/enhancing-human-understanding-of-a-mobile-robots-state-and-actions-using-expressive-lights/</loc></url><url><loc>https://www.sei.cmu.edu/library/spatial-references-and-perspective-in-natural-language-instructions-for-collaborative-manipulation/</loc></url><url><loc>https://www.sei.cmu.edu/library/uav-and-service-robot-coordination-for-indoor-object-search-tasks/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/gbtl-cuda-graph-algorithms-and-primitives-for-gpus/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mathematical-foundations-of-the-graphblas/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-duties-skills-and-knowledge-of-software-architects/</loc></url><url><loc>https://www.sei.cmu.edu/library/open-source-measurement-of-fast-flux-networks-while-considering-domain-name-parking/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/bridging-the-gap-a-pragmatic-approach-to-generating-insider-threat-data/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/workshop-how-to-get-started-in-software-assurance-education/</loc></url><url><loc>https://www.sei.cmu.edu/library/ninth-internationalworkshop-on-managing-technical-debt-report-on-the-mtd-2017-workshop/</loc><lastmod>2023-11-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/modern-devops-optimizing-software-development-through-effective-system-interactions/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-devops-process-and-implementation/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/implementing-secure-devops-assessment-for-highly-regulated-environments/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/continuous-system-and-user-documentation-integration/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-early-look-at-defining-variability-requirements-for-system-of-systems-platforms/</loc></url><url><loc>https://www.sei.cmu.edu/library/prioritizing-alerts-from-multiple-static-analysis-tools-using-classification-models/</loc></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-2018-international-conference-on-technical-debt/</loc></url><url><loc>https://www.sei.cmu.edu/library/detecting-leaks-of-sensitive-data-due-to-stale-reads/</loc></url><url><loc>https://www.sei.cmu.edu/library/incremental-life-cycle-assurance-of-safety-critical-systems/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/systems-engineeringsoftware-engineering-interface-for-cyber-physical-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-second-international-conference-on-technical-debt/</loc></url><url><loc>https://www.sei.cmu.edu/library/component-mismatches-are-a-critical-bottleneck-to-fielding-ai-enabled-systems-in-the-public-sector/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/designing-trustworthy-ai-a-human-machine-teaming-framework-to-guide-development/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/performance-analysis-of-real-time-component-architectures-a-model-interchange-approach/</loc></url><url><loc>https://www.sei.cmu.edu/library/predicting-the-behavior-of-a-highly-configurable-component-based-real-time-system/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/on-managing-vulnerabilities-in-aiml-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/evaluation-of-qaoa-based-on-the-approximation-ratio-of-individual-samples/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-foraging-for-improving-survivability-of-mobile-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/establishing-trusted-identities-in-disconnected-edge-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-vm-migration-in-tactical-cloudlets/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-value-engineering-to-propel-cyber-physical-systems-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/system-architecture-virtual-integration-a-case-study/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-mde-based-process-for-the-design-implementation-and-validation-of-safety-critical-systems/</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/model-based-software-quality-assurance-with-the-architecture-analysis-and-design-language/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/challenges-in-validating-safety-critical-embedded-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/modeling-the-implementation-of-state-based-system-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/verification-of-replication-architectures-in-aadl/</loc></url><url><loc>https://www.sei.cmu.edu/library/validating-safety-and-security-requirements-for-partitioned-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/can-ai-close-the-design-code-abstraction-gap/</loc></url><url><loc>https://www.sei.cmu.edu/library/next-generation-automated-software-evolution-refactoring-at-scale/</loc></url><url><loc>https://www.sei.cmu.edu/library/understanding-patterns-for-system-of-systems-integration/</loc></url><url><loc>https://www.sei.cmu.edu/library/characterizing-and-detecting-mismatch-in-machine-learning-enabled-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/kalki-a-software-defined-iot-security-platform/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/towards-an-architecture-for-trusted-edge-iot-security-gateways/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/kalki-a-scalable-and-extensible-iot-security-platform/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/delay-tolerant-data-sharing-in-tactical-environments/</loc><lastmod>2024-10-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/industrys-cry-for-tools-that-support-large-scale-refactoring/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/kernel-density-decision-trees/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/exploring-opportunities-in-usable-hazard-analysis-processes-for-ai-engineering/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/building-coherent-use-into-the-devops-lifecycle-for-high-stakes-ai/</loc></url><url><loc>https://www.sei.cmu.edu/library/experience-with-using-synthetic-training-images-for-wearable-cognitive-assistance/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/lessons-learned-in-human-artificial-intelligence-teaming-in-business-processes/</loc></url><url><loc>https://www.sei.cmu.edu/library/measuring-beyond-accuracy/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/adaptive-autonomy-as-a-means-for-implementing-shared-ethics-in-human-ai-teams/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/deep-system-instrumentation-for-in-situ-human-ai-interaction-measurement-within-complex-information-systems/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/untangling-the-knot-enabling-architecture-evolution-with-search-based-refactoring/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-configuration-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/information-protection/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-safety/</loc></url><url><loc>https://www.sei.cmu.edu/library/assurance-of-software-quality/</loc></url><url><loc>https://www.sei.cmu.edu/library/formal-specification-of-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/models-of-software-evolution-life-cycle-and-process/</loc></url><url><loc>https://www.sei.cmu.edu/library/support-materials-for-software-configuration-management/</loc><lastmod>2024-07-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/support-materials-for-formal-specification-of-software/</loc><lastmod>2024-06-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-metrics/</loc></url><url><loc>https://www.sei.cmu.edu/library/formal-verification-of-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-software-design/</loc></url><url><loc>https://www.sei.cmu.edu/library/unit-testing-and-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-software-verification-and-validation/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/intellectual-property-protection-for-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-development-using-vdm/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-project-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-design-methods-for-real-time-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-specification-a-framework/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-requirements/</loc></url><url><loc>https://www.sei.cmu.edu/library/technical-writing-for-software-engineers/</loc></url><url><loc>https://www.sei.cmu.edu/library/concepts-of-concurrent-programming/</loc></url><url><loc>https://www.sei.cmu.edu/library/language-and-system-support-for-concurrent-programming/</loc></url><url><loc>https://www.sei.cmu.edu/library/understanding-program-dependencies/</loc></url><url><loc>https://www.sei.cmu.edu/library/support-materials-for-language-and-system-support-for-concurrent-programming/</loc></url><url><loc>https://www.sei.cmu.edu/library/formal-specification-and-verification-of-concurrent-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/measuring-object-oriented-software-products/</loc></url><url><loc>https://www.sei.cmu.edu/library/sia-curriculum/</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-maintenance-exercises-for-a-software-engineering-project-course/</loc></url><url><loc>https://www.sei.cmu.edu/library/apse-interactive-monitor-a-software-artifact-for-software-engineering-education/</loc></url><url><loc>https://www.sei.cmu.edu/library/reading-computer-programs-instructors-guide-and-exercises/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-software-engineering-project-course-with-a-real-client/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/scenes-of-software-inspections-video-dramatizations-for-the-classroom/</loc></url><url><loc>https://www.sei.cmu.edu/library/materials-to-support-teaching-a-project-intensive-introduction-to-software-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/materials-for-teaching-software-inspections/</loc></url><url><loc>https://www.sei.cmu.edu/library/lecture-notes-on-software-process-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/lecture-notes-on-engineering-measurement-for-software-engineers/</loc></url><url><loc>https://www.sei.cmu.edu/library/lecture-notes-on-requirements-elicitation/</loc></url><url><loc>https://www.sei.cmu.edu/library/rate-monotonic-analysis-for-real-time-systems-instructors-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-for-executives-bibliography/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-for-executives-acronyms/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-for-executives-definitions/</loc></url><url><loc>https://www.sei.cmu.edu/library/tutorial-series-for-gams-and-madara/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/smart-materials/</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-for-executives-course-materials-by-topic/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/square-instructional-materials/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-security-engineering-course-material/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-software-management-course-material/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-software-design-and-programming-course-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-six-sigma-body-of-knowledge-bok/</loc></url><url><loc>https://www.sei.cmu.edu/library/assured-software-development-1-asd1-course/</loc></url><url><loc>https://www.sei.cmu.edu/library/assurance-management-am-course/</loc></url><url><loc>https://www.sei.cmu.edu/library/views-and-beyond-documentation-template/</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-personal-software-process-psp-course-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/leading-a-development-team-course-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-team-software-process-tsp-teams-course-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/personal-software-process-psp-for-engineers-version-321-course-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/personal-software-process-psp-for-engineers-version-4-course-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/personal-software-process-psp-fundamentals-and-advanced-course-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/personal-software-process-psp-instructor-training-course-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/team-software-process-tsp-team-member-training-course-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/team-software-process-tsp-2010-launch-materials/</loc><lastmod>2024-01-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/team-software-process-tsp-coach-training-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/team-software-process-tsp-executive-strategy-seminar-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/team-software-process-tsp-plus-launch-materials/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/psp-for-the-21st-century-block-1/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-intelligence-tradecraft-report-the-state-of-cyber-intelligence-practices-in-the-united-states-study-report-only/</loc></url><url><loc>https://www.sei.cmu.edu/library/artificial-intelligence-and-cyber-intelligence-an-implementation-guide/</loc><lastmod>2024-08-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/goal-driven-measurement-igdm-sema-course/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-acquisition-curriculum/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-acquisition-curriculum/</loc></url><url><loc>https://www.sei.cmu.edu/library/psp-for-the-21st-century-block-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/psp-for-the-21st-century-block-3/</loc></url><url><loc>https://www.sei.cmu.edu/library/psp-for-the-21st-century-block-4/</loc></url><url><loc>https://www.sei.cmu.edu/library/psp-for-the-21st-century-block-5/</loc></url><url><loc>https://www.sei.cmu.edu/library/designing-products-and-processes-using-six-sigma-dppss-sema-course/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/improving-process-performance-using-six-sigma-ippss-sema-course/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-software-product-lines-course/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/adopting-software-product-lines/</loc></url><url><loc>https://www.sei.cmu.edu/library/developing-software-product-lines/</loc></url><url><loc>https://www.sei.cmu.edu/library/organizational-models-for-computer-security-incident-response-teams-csirts/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/handbook-for-computer-security-incident-response-teams-csirts/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/advanced-information-assurance-handbook/</loc></url><url><loc>https://www.sei.cmu.edu/library/octave-s-implementation-guide-version-1/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/first-responders-guide-to-computer-forensics/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/first-responders-guide-to-computer-forensics-advanced-topics/</loc></url><url><loc>https://www.sei.cmu.edu/library/designing-an-effective-survey/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-acquisition-planning-guidelines/</loc></url><url><loc>https://www.sei.cmu.edu/library/quasar-a-method-for-the-quality-assessment-of-software-intensive-system-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/defense-in-depth-foundations-for-secure-and-resilient-enterprises/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-software-process-framework-for-the-sei-capability-maturity-model/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-systems-engineering-capability-maturity-model-version-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-description-of-the-systems-engineering-capability-maturity-model-appraisal-method-version-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/ideal-a-users-guide-for-software-process-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/goal-driven-software-measurement-a-guidebook/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-description-of-the-systems-engineering-capability-maturity-model-appraisal-method-version-11/</loc></url><url><loc>https://www.sei.cmu.edu/library/c4-software-technology-reference-guide-a-prototype/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-acquisition-risk-management-key-process-area-kpa-guidebook-version-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/practical-software-measurement-measuring-for-process-management-and-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-acquisition-risk-management-key-process-area-kpa-a-guidebook-version-102/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-resilience-management-model-cert-rmm-version-12/</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/building-a-cybersecurity-awareness-program/</loc><lastmod>2026-01-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/guide-to-effective-incident-management-communications/</loc></url><url><loc>https://www.sei.cmu.edu/library/enabling-the-sustainability-and-success-of-a-national-computer-security-incident-response-team/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/people-capability-maturity-model-p-cmm-version-20/</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/overview-of-the-people-capability-maturity-model-version-11/</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/people-capability-maturity-model/</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-systems-engineering-capability-maturity-model-version-11/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-fundamentals-of-agile/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-for-soldiers-who-use-smartphones/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecting-service-oriented-systems/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-sei-strategic-plan/</loc></url><url><loc>https://www.sei.cmu.edu/library/quantifying-uncertainty-in-early-lifecycle-cost-estimation/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecting-a-financial-system-with-tsp/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-importance-of-data-quality/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/misaligned-incentives/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cloud-computing-for-the-battlefield/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-architecture-focused-measurement-framework-for-managing-technical-debt/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-a-disciplined-process-enhances-enables-agility/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/computer-and-network-forensics-a-masters-level-curriculum/</loc></url><url><loc>https://www.sei.cmu.edu/library/computer-forensics-for-business-leaders-building-robust-policies-and-processes/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/computer-forensics-for-business-leaders-a-primer/</loc></url><url><loc>https://www.sei.cmu.edu/library/nist-catalog-of-security-and-privacy-controls-including-insider-threat/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/public-private-partnerships-essential-for-national-cyber-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/establishing-a-national-computer-security-incident-response-team-csirt/</loc></url><url><loc>https://www.sei.cmu.edu/library/leveraging-security-policies-and-procedures-for-electronic-evidence-discovery/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-risk-to-critical-infrastructures-at-the-national-level/</loc></url><url><loc>https://www.sei.cmu.edu/library/making-information-security-policy-happen/</loc></url><url><loc>https://www.sei.cmu.edu/library/becoming-a-smart-buyer-of-software/</loc><lastmod>2023-11-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/information-compliance-a-growing-challenge-for-business-leaders/</loc></url><url><loc>https://www.sei.cmu.edu/library/internal-audits-role-in-information-security-an-introduction/</loc></url><url><loc>https://www.sei.cmu.edu/library/tackling-security-at-the-national-level-a-resource-for-leaders/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-standards-to-build-an-information-security-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/getting-real-about-security-governance/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-legal-side-of-global-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-leaders-should-care-about-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/compliance-vs-buy-in/</loc></url><url><loc>https://www.sei.cmu.edu/library/measuring-operational-resilience/</loc></url><url><loc>https://www.sei.cmu.edu/library/getting-to-a-useful-set-of-security-metrics/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-benchmarks-to-make-better-security-decisions/</loc></url><url><loc>https://www.sei.cmu.edu/library/initiating-a-security-metrics-program-key-points-to-consider/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-a-security-metrics-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-roi-of-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/considering-security-and-privacy-in-the-move-to-electronic-health-records/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrating-privacy-practices-into-the-software-development-life-cycle/</loc></url><url><loc>https://www.sei.cmu.edu/library/electronic-health-records-challenges-for-patient-privacy-and-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/protecting-information-privacy-how-to-and-lessons-learned/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-value-of-de-identified-personal-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/privacy-the-slow-tipping-point/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-disruptive-events-making-the-case-for-operational-resilience/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/us-postal-inspection-service-use-of-the-cert-resilience-management-model/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insights-from-the-first-cert-resilience-management-model-users-group/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-the-smart-grid-maturity-model-sgmm/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrated-enterprise-wide-risk-management-nist-800-39-and-cert-rmm/</loc></url><url><loc>https://www.sei.cmu.edu/library/conducting-cyber-exercises-at-the-national-level/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-resilient-is-my-organization/</loc></url><url><loc>https://www.sei.cmu.edu/library/train-for-the-unexpected/</loc></url><url><loc>https://www.sei.cmu.edu/library/introducing-the-smart-grid-maturity-model-sgmm/</loc></url><url><loc>https://www.sei.cmu.edu/library/ensuring-continuity-of-operations-when-business-is-disrupted/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-relationships-with-business-partners-to-achieve-operational-resiliency/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-smart-grid-managing-electrical-power-distribution-and-use-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/rethinking-risk-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-a-key-enabler-of-business-innovation/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-alternative-to-risk-management-for-information-and-software-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-risk-assessment-using-octave-allegro/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-path-from-information-security-risk-assessment-to-compliance/</loc></url><url><loc>https://www.sei.cmu.edu/library/business-resilience-a-more-compelling-argument-for-information-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/resiliency-engineering-integrating-security-it-operations-and-business-continuity/</loc></url><url><loc>https://www.sei.cmu.edu/library/adapting-to-changing-risk-environments-operational-resilience/</loc></url><url><loc>https://www.sei.cmu.edu/library/assuring-mission-success-in-complex-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-to-become-a-cyber-warrior/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-a-masters-level-curriculum/</loc></url><url><loc>https://www.sei.cmu.edu/library/better-incident-response-through-scenario-based-training/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-high-fidelity-online-training-to-stay-sharp/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-business-leaders-can-expect-from-security-degree-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-new-look-at-the-business-of-it-education/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-staff-competence-in-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/ciscos-adoption-of-cert-secure-coding-standards/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-to-develop-more-secure-software-practices-from-thirty-organizations/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-power-of-fuzz-testing-to-reduce-security-vulnerabilities/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-role-of-the-ciso-in-developing-more-secure-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/is-there-value-in-identifying-software-security-never-events/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-experience-based-maturity-model-for-software-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/mainstreaming-secure-coding-practices/</loc></url><url><loc>https://www.sei.cmu.edu/library/developing-secure-software-universities-as-supply-chain-partners/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-to-start-a-secure-software-development-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/identifying-software-security-requirements-early-not-after-the-fact/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-more-secure-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-a-malware-analysis-capability/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/indicators-and-controls-for-mitigating-insider-threat/</loc><lastmod>2023-10-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/protect-your-business-from-money-mules/</loc><lastmod>2023-06-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mitigating-insider-threat-new-and-improved-practices/</loc></url><url><loc>https://www.sei.cmu.edu/library/more-targeted-sophisticated-attacks-where-to-pay-attention/</loc></url><url><loc>https://www.sei.cmu.edu/library/getting-in-front-of-social-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-and-the-software-development-life-cycle/</loc></url><url><loc>https://www.sei.cmu.edu/library/tackling-the-growing-botnet-threat/</loc></url><url><loc>https://www.sei.cmu.edu/library/inadvertent-data-disclosure-on-peer-to-peer-networks/</loc></url><url><loc>https://www.sei.cmu.edu/library/protecting-against-insider-threat/</loc></url><url><loc>https://www.sei.cmu.edu/library/proactive-remedies-for-rising-threats/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-security-safety-and-ethics-for-the-net-generation/</loc></url><url><loc>https://www.sei.cmu.edu/library/tackling-tough-challenges-insights-from-certs-director-rich-pethia/</loc></url><url><loc>https://www.sei.cmu.edu/library/climate-change-implications-for-information-technology-and-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrating-security-incident-response-and-e-discovery/</loc></url><url><loc>https://www.sei.cmu.edu/library/virtual-communities-risks-and-opportunities/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-human-side-of-security-trade-offs/</loc></url><url><loc>https://www.sei.cmu.edu/library/dual-perspectives-a-cios-and-cisos-take-on-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/reducing-security-costs-with-standard-configurations-us-government-initiatives/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/real-world-security-for-business-leaders/</loc></url><url><loc>https://www.sei.cmu.edu/library/convergence-integrating-physical-and-it-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/it-infrastructure-tips-for-navigating-tough-spots/</loc></url><url><loc>https://www.sei.cmu.edu/library/evolving-business-models-threats-and-technologies-a-conversation-with-certs-deputy-director-for-technology/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-lessons-learned-a-conversation-with-rich-pethia-director-of-cert/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-network-flow-data-to-profile-your-network-and-reduce-vulnerabilities/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-to-more-effectively-manage-vulnerabilities-and-the-attacks-that-exploit-them/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/why-organizations-need-a-secure-domain-name-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/controls-for-monitoring-the-security-of-cloud-services/</loc></url><url><loc>https://www.sei.cmu.edu/library/mobile-device-security-threats-risks-and-actions-to-take/</loc></url><url><loc>https://www.sei.cmu.edu/library/securing-industrial-control-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-the-facts-to-protect-enterprise-networks-certs-netsa-team/</loc></url><url><loc>https://www.sei.cmu.edu/library/analyzing-internet-traffic-for-better-cyber-situational-awareness/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-upside-and-downside-of-security-in-the-cloud/</loc></url><url><loc>https://www.sei.cmu.edu/library/concrete-steps-for-implementing-an-information-security-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-security-vulnerabilities-based-on-what-matters-most/</loc></url><url><loc>https://www.sei.cmu.edu/library/connecting-the-dots-between-it-operations-and-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-real-secrets-of-incident-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/crisis-communications-during-a-security-incident/</loc></url><url><loc>https://www.sei.cmu.edu/library/inside-defense-in-depth/</loc></url><url><loc>https://www.sei.cmu.edu/library/change-management-the-security-x-factor/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-latest-developments-in-aadl/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/managing-disruptive-events-demand-for-an-integrated-approach-to-better-manage-risk/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/standards-in-cloud-computing-interoperability/</loc></url><url><loc>https://www.sei.cmu.edu/library/technology-readiness-assessments/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-state-of-the-practice-of-cyber-intelligence/</loc></url><url><loc>https://www.sei.cmu.edu/library/securing-mobile-devices-aka-byod/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-a-malware-ontology-to-make-progress-towards-a-science-of-cybersecurity/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mitigating-insider-threat-new-and-improved-practices-fourth-edition/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/reliability-validation-and-improvement-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-business-case-for-systems-engineering/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/whats-new-with-version-2-of-the-aadl-standard/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-evolution-of-a-science-project/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-disruptive-events-cert-rmm-experience-reports/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/application-virtualization-as-a-strategy-for-cyber-foraging/</loc></url><url><loc>https://www.sei.cmu.edu/library/common-testing-problems-pitfalls-to-prevent-and-mitigate/</loc></url><url><loc>https://www.sei.cmu.edu/library/joint-programs-and-social-dilemmas/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-agile-in-the-dod-second-principle/</loc><lastmod>2023-10-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devops-transform-development-and-operations-for-fast-secure-deployments/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-use-maturity-models-to-improve-cybersecurity-key-concepts-principles-and-definitions/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-agile-in-the-dod-third-principle/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mobile-applications-for-emergency-managers/</loc></url><url><loc>https://www.sei.cmu.edu/library/human-in-the-loop-autonomy/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-archetypes/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-the-cyber-resilience-review-to-help-critical-infrastructures-better-manage-operational-resilience/</loc></url><url><loc>https://www.sei.cmu.edu/library/raising-the-bar-mainstreaming-cert-c-secure-coding-rules/</loc></url><url><loc>https://www.sei.cmu.edu/library/aadl-and-t%C3%A9l%C3%A9com-paris-tech/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-cases/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-electricity-subsector-cybersecurity-capability-maturity-model-es-c2m2/</loc></url><url><loc>https://www.sei.cmu.edu/library/comparing-it-risk-assessment-and-analysis-methods/</loc></url><url><loc>https://www.sei.cmu.edu/library/aadl-and-aerospace/</loc></url><url><loc>https://www.sei.cmu.edu/library/three-variations-on-the-v-model-for-system-and-software-testing/</loc></url><url><loc>https://www.sei.cmu.edu/library/best-practices-for-trust-in-the-wireless-emergency-alerts-service/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/characterizing-and-prioritizing-malicious-code/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-quality-attributes-to-improve-acquisition/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/applying-agile-in-the-dod-sixth-principle/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/adapting-the-psp-to-incorporate-verified-design-by-contract/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/assuring-open-source-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-pattern-assurance-through-roundtrip-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-agile-in-the-dod-fifth-principle/</loc></url><url><loc>https://www.sei.cmu.edu/library/from-process-to-performance-based-improvement/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-approach-to-managing-the-software-engineering-challenges-of-big-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/situational-awareness-mashups/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-agile-in-the-dod-fourth-principle/</loc><lastmod>2024-10-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecting-systems-of-the-future/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-agile-in-the-dod-first-principle/</loc></url><url><loc>https://www.sei.cmu.edu/library/safety-and-behavior-specification-using-the-architecture-analysis-and-design-language/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-and-wireless-emergency-alerts/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/aadl-and-edgewater/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-agile-in-the-dod-seventh-principle/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/html5-for-mobile-apps-at-the-edge/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-appraisal-of-systems-engineering-defense-v-non-defense/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/four-principles-for-engineering-scalable-big-data-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-taxonomy-of-operational-risks-for-cyber-security/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/agile-metrics/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/applying-agile-in-the-dod-eighth-principle/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-state-of-agile/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/coding-with-aadl/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-software-teams-and-how-they-engage-with-systems-engineering-on-dod-acquisition-programs/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-insurance-and-its-role-in-mitigating-cybersecurity-risk/</loc></url><url><loc>https://www.sei.cmu.edu/library/tactical-cloudlets/</loc></url><url><loc>https://www.sei.cmu.edu/library/aadl-and-dassault-aviation/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-workshop-on-measuring-what-matters/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-agile-in-the-dod-ninth-principle/</loc></url><url><loc>https://www.sei.cmu.edu/library/predicting-software-assurance-using-quality-and-reliability-measures/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-agile-in-the-dod-tenth-principle/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/applying-agile-in-the-dod-eleventh-principle/</loc></url><url><loc>https://www.sei.cmu.edu/library/supply-chain-risk-management-managing-third-party-and-external-dependency-risk/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-the-mission-thread-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-agile-in-the-dod-twelfth-principle/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/data-driven-software-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-introduction-to-context-aware-computing/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-hcii-collaboration-explores-context-aware-computing-for-soldiers/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/defect-prioritization-with-the-risk-priority-number/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/agile-methods-in-air-force-sustainment/</loc></url><url><loc>https://www.sei.cmu.edu/library/designing-security-into-software-reliant-systems/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/capturing-the-expertise-of-cybersecurity-incident-handlers/</loc></url><url><loc>https://www.sei.cmu.edu/library/reducing-complexity-in-software-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-taxonomy-of-testing-types/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-the-university-of-pittsburgh-is-using-the-nist-cybersecurity-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/improving-quality-using-architecture-fault-analysis-with-confidence-arguments/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-cyber-insurance-is-driving-risk-and-technology-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/toward-speed-and-simplicity-creating-a-software-library-for-graph-analytics/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/four-types-of-shift-left-testing/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-software-assurance-curriculum-for-future-engineers/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-field-study-of-technical-debt/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/structuring-the-chief-information-security-officer-organization/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-interview-with-grady-booch/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/build-security-in-maturity-model-bsimm-practices-from-seventy-eight-organizations/</loc></url><url><loc>https://www.sei.cmu.edu/library/identifying-the-architectural-roots-of-vulnerabilities/</loc></url><url><loc>https://www.sei.cmu.edu/library/is-java-more-secure-than-c/</loc></url><url><loc>https://www.sei.cmu.edu/library/quality-attribute-refinement-and-allocation/</loc></url><url><loc>https://www.sei.cmu.edu/library/toward-efficient-and-effective-software-sustainment/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/effective-reduction-of-avoidable-complexity-in-embedded-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/open-systems-architectures-when-where-to-be-closed/</loc></url><url><loc>https://www.sei.cmu.edu/library/threat-modeling-and-the-internet-of-things/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/evolving-air-force-intelligence-with-agile-techniques/</loc></url><url><loc>https://www.sei.cmu.edu/library/intelligence-preparation-for-operational-resilience/</loc></url><url><loc>https://www.sei.cmu.edu/library/global-value-chain-an-expanded-view-of-the-ict-supply-chain/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-open-source-tool-for-fault-tree-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-sei-fellow-series-nancy-mead/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-and-the-internet-of-things/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-community-college-curriculum-for-secure-software-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-flow-and-beyond/</loc></url><url><loc>https://www.sei.cmu.edu/library/becoming-a-ciso-formal-and-informal-requirements/</loc></url><url><loc>https://www.sei.cmu.edu/library/predicting-quality-assurance-with-software-metrics-and-security-methods/</loc></url><url><loc>https://www.sei.cmu.edu/library/improving-cybersecurity-through-cyber-intelligence/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-requirement-specification-language-for-aadl/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/moving-target-defense/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-security-engineering-for-software-and-systems-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/best-practices-for-preventing-and-responding-to-distributed-denial-of-service-ddos-attacks/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-modeling-tools/</loc></url><url><loc>https://www.sei.cmu.edu/library/three-roles-and-three-failure-patterns-of-software-architects/</loc></url><url><loc>https://www.sei.cmu.edu/library/dns-best-practices/</loc></url><url><loc>https://www.sei.cmu.edu/library/technical-debt-as-a-core-software-engineering-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/verifying-distributed-adaptive-real-time-systems/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/10-at-risk-emerging-technologies/</loc></url><url><loc>https://www.sei.cmu.edu/library/distributed-artificial-intelligence-in-space/</loc></url><url><loc>https://www.sei.cmu.edu/library/establishing-trust-in-disconnected-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/ntp-best-practices/</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-fellows-series-peter-feiler/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrating-security-in-devops/</loc></url><url><loc>https://www.sei.cmu.edu/library/ransomware-best-practices-for-prevention-and-response/</loc></url><url><loc>https://www.sei.cmu.edu/library/scaling-agile-methods/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-cert-software-assurance-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/verifying-software-assurance-with-ibms-watson/</loc></url><url><loc>https://www.sei.cmu.edu/library/best-practices-network-border-protection/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dns-blocking-to-disrupt-malware/</loc></url><url><loc>https://www.sei.cmu.edu/library/at-risk-emerging-technology-domains/</loc></url><url><loc>https://www.sei.cmu.edu/library/mission-practical-biometrics/</loc></url><url><loc>https://www.sei.cmu.edu/library/positive-incentives-for-reducing-insider-threat/</loc></url><url><loc>https://www.sei.cmu.edu/library/pharos-binary-static-analysis-an-update/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/5-best-practices-for-preventing-and-responding-to-insider-threat/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-risk-management-fits-into-agile-devops-in-government/</loc></url><url><loc>https://www.sei.cmu.edu/library/is-software-spoiling-us-innovations-in-daily-life-from-software/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/is-software-spoiling-us-technical-innovations-in-the-department-of-defense/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-devops/</loc></url><url><loc>https://www.sei.cmu.edu/library/obsidian-a-safer-blockchain-programming-language/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-evolving-role-of-the-chief-risk-officer/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/best-practices-in-cyber-intelligence/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-sustainment-and-product-lines/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-engineering-software-assurance-opportunities-risks/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-does-software-cost-so-much/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-role-of-the-software-factory-in-acquisition-and-sustainment/</loc></url><url><loc>https://www.sei.cmu.edu/library/workplace-violence-and-insider-threat/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-to-be-a-network-traffic-analyst/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-test-suites-for-static-analysis-alert-classifiers/</loc></url><url><loc>https://www.sei.cmu.edu/library/risks-threats-and-vulnerabilities-in-moving-to-the-cloud/</loc></url><url><loc>https://www.sei.cmu.edu/library/best-practices-for-security-in-cloud-computing/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-technical-strategy-for-cybersecurity/</loc></url><url><loc>https://www.sei.cmu.edu/library/system-architecture-virtual-integration-roi-on-early-discovery-of-defects/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-best-practices-in-network-traffic-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/blockchain-at-cmu-and-beyond/</loc></url><url><loc>https://www.sei.cmu.edu/library/leading-in-the-age-of-artificial-intelligence/</loc></url><url><loc>https://www.sei.cmu.edu/library/10-types-of-application-security-testing-tools-and-how-to-use-them/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-technical-debt-a-focus-on-automation-design-and-architecture/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/defending-your-organization-against-business-email-compromise/</loc></url><url><loc>https://www.sei.cmu.edu/library/devops-in-highly-regulated-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/assessing-cybersecurity-training/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-intelligence-best-practices-and-biggest-challenges/</loc></url><url><loc>https://www.sei.cmu.edu/library/privacy-in-the-blockchain-era/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-aadl-error-library/</loc></url><url><loc>https://www.sei.cmu.edu/library/ai-in-humanitarian-assistance-and-disaster-response/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/selecting-metrics-for-software-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-software-architects-must-be-involved-in-the-earliest-systems-engineering-activities/</loc></url><url><loc>https://www.sei.cmu.edu/library/improving-the-common-vulnerability-scoring-system/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/human-factors-in-software-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/machine-learning-in-cybersecurity-7-questions-for-decision-makers/</loc></url><url><loc>https://www.sei.cmu.edu/library/benchmarking-organizational-incident-management-practices/</loc></url><url><loc>https://www.sei.cmu.edu/library/reverse-engineering-object-oriented-code-with-ghidra-and-new-pharos-tools/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-future-of-cyber-security-and-resilience/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-future-of-cyber-security-and-privacy/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-cert-guide-to-coordinated-vulnerability-disclosure/</loc></url><url><loc>https://www.sei.cmu.edu/library/designing-trustworthy-ai/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-future-of-cyber-cybercrime/</loc></url><url><loc>https://www.sei.cmu.edu/library/challenges-to-implementing-devops-in-highly-regulated-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-future-of-cyber-secure-coding/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmc-levels-1-3-going-beyond-nist-sp-171/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-cybersecurity/</loc></url><url><loc>https://www.sei.cmu.edu/library/documenting-process-for-cmmc/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-future-of-cyber-educating-the-cybersecurity-workforce/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/developing-an-effective-cmmc-policy/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmc-scoring-101/</loc></url><url><loc>https://www.sei.cmu.edu/library/quantum-computing-the-quantum-advantage/</loc></url><url><loc>https://www.sei.cmu.edu/library/situational-awareness-for-cybersecurity-beyond-the-network/</loc></url><url><loc>https://www.sei.cmu.edu/library/reviewing-and-measuring-activities-for-effectiveness-in-cmmc-level-4/</loc></url><url><loc>https://www.sei.cmu.edu/library/optimizing-process-maturity-in-cmmc-level-5/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-stakeholder-specific-vulnerability-categorization/</loc></url><url><loc>https://www.sei.cmu.edu/library/challenging-the-myth-of-the-10x-programmer/</loc></url><url><loc>https://www.sei.cmu.edu/library/achieving-continuous-authority-to-operate-ato/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-introduction-to-cmmc-assessment-guides/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-cmmc-level-1-assessment-guide-a-closer-look/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-cmmc-level-3-assessment-guide-a-closer-look/</loc></url><url><loc>https://www.sei.cmu.edu/library/work-from-home-threats-vulnerabilities-and-strategies-for-protecting-your-network/</loc></url><url><loc>https://www.sei.cmu.edu/library/vince-a-software-vulnerability-coordination-platform/</loc></url><url><loc>https://www.sei.cmu.edu/library/ransomware-evolution-rise-and-response/</loc></url><url><loc>https://www.sei.cmu.edu/library/7-steps-to-engineer-security-into-ongoing-and-future-container-adoption-efforts/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-10-step-framework-for-managing-risk/</loc></url><url><loc>https://www.sei.cmu.edu/library/digital-engineering-and-devsecops/</loc></url><url><loc>https://www.sei.cmu.edu/library/mission-based-prioritization-a-new-method-for-prioritizing-agile-backlogs/</loc></url><url><loc>https://www.sei.cmu.edu/library/moving-from-devops-to-devsecops/</loc></url><url><loc>https://www.sei.cmu.edu/library/ai-workforce-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-vulnerabilities-in-machine-learning-and-artificial-intelligence-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/is-your-organization-ready-for-ai/</loc></url><url><loc>https://www.sei.cmu.edu/library/can-devsecops-make-developers-happier/</loc></url><url><loc>https://www.sei.cmu.edu/library/benefits-and-challenges-of-model-based-systems-engineering/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/11-rules-for-ensuring-a-security-model-with-aadl-and-belllapadula/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/uncertainty-quantification-in-machine-learning-measuring-confidence-in-predictions/</loc></url><url><loc>https://www.sei.cmu.edu/library/zero-trust-adoption-benefits-applications-and-resources/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-scientific-methods-in-cybersecurity/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/agile-strategic-planning-concepts-and-methods-for-success/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/bias-in-ai-impact-challenges-and-opportunities/</loc></url><url><loc>https://www.sei.cmu.edu/library/measuring-devsecops-the-way-forward/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-silver-thread-of-cyber-in-the-global-supply-chain/</loc></url><url><loc>https://www.sei.cmu.edu/library/enabling-transition-from-sustainment-to-engineering-within-the-dod/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-engineering-for-machine-learning/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-discussion-on-automation-with-watts-humphrey-award-winner-rajendra-prasad/</loc></url><url><loc>https://www.sei.cmu.edu/library/walking-fast-into-the-future-evolvable-technical-reference-frameworks-for-mixed-criticality-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/implementing-the-dods-ethical-ai-principles/</loc></url><url><loc>https://www.sei.cmu.edu/library/envisioning-the-future-of-software-engineering/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/building-on-ghidra-tools-for-automating-reverse-engineering-and-malware-analysis/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/securing-the-supply-chain-for-the-defense-industrial-base/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-and-systems-collaboration-in-the-era-of-smart-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/incorporating-supply-chain-risk-and-devsecops-into-a-cybersecurity-strategy/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-based-systems-engineering-meets-devsecops/</loc><lastmod>2024-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/explainable-ai-explained/</loc></url><url><loc>https://www.sei.cmu.edu/library/undiscovered-vulnerabilities-not-just-for-critical-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/devsecops-for-ai-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/challenges-and-metrics-in-digital-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-4-phases-of-the-zero-trust-journey/</loc></url><url><loc>https://www.sei.cmu.edu/library/trust-and-ai-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-dive-into-deepfakes/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-platform-independent-model-for-devsecops/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-the-quantum-approximate-optimization-algorithm-qaoa-to-solve-binary-variable-optimization-problems/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-patterns-for-robustness/</loc></url><url><loc>https://www.sei.cmu.edu/library/ml-driven-decision-making-in-realistic-cyber-exercises/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-roadmap-for-creating-and-using-virtual-prototyping-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-patterns-for-deployability/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-method-for-assessing-cloud-adoption-risks/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-developer-velocity-and-system-security-with-devsecops/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-model-based-tool-for-designing-safety-critical-systems/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/securing-open-source-software-in-the-dod/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/asking-the-right-questions-to-coordinate-security-in-the-supply-chain/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/improving-interoperability-in-coordinated-vulnerability-disclosure-with-vultron/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-security-in-rust/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-infrastructure-focused-framework-for-adopting-devsecops/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-messy-middle-of-large-language-models/</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-exploration-of-enterprise-technical-debt/</loc></url><url><loc>https://www.sei.cmu.edu/library/key-steps-to-integrate-secure-by-design-into-acquisition-and-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-by-design-secure-by-default/</loc></url><url><loc>https://www.sei.cmu.edu/library/we-live-in-software-engineering-societal-scale-systems/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2013-ieee-symposium-quilt-poster/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sketch-of-matt-butkovic/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sketch-of-nate-silcox/</loc><lastmod>2025-05-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sketch-of-mark-zajicek/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sketch-of-john-houston/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sketch-of-buddy-gillespie/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sketch-of-lee-kim/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sketch-of-alix-goss/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/research-opportunities-in-process-and-performance-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/edge-analytics-real-time-analysis-of-social-media/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-edge-enabled-tactical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/edge-analytics-real-time-analysis-of-high-volume-streaming-data/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cloud-computing-in-tactical-environments/</loc><lastmod>2024-02-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2012-day-1-part-2/</loc><lastmod>2025-09-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-engineering-solutions-group-how-we-create-innovative-solutions-for-people/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/vulnerability-discovery-project/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-mitigation-project/</loc></url><url><loc>https://www.sei.cmu.edu/library/deep-focus-increasing-user-depth-of-field-to-improve-threat-detection/</loc></url><url><loc>https://www.sei.cmu.edu/library/quality-and-software-assurance-project/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-engineering-risk-analysis-project/</loc></url><url><loc>https://www.sei.cmu.edu/library/twc-small-empirical-evaluation-of-the-usability-and-security-implications-of-application-programming-interface-design/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-mitigation-posters-sei-2015-research-review/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/agile-in-government-poster-sei-2015-research-review/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/api-usability-and-security-poster-sei-2015-research-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-security-via-signaling-games-poster-sei-2015-research-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/design-pattern-recovery-from-malware-binaries-poster-sei-2015-research-review/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/edge-enabled-tactical-systems-poster-sei-2015-research-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/effecting-large-scale-adaptive-swarms-through-intelligent-collaboration-poster-sei-2015-research-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/effective-reduction-of-avoidable-complexity-in-embedded-systems-poster-sei-2015-research-review/</loc><lastmod>2024-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/extending-aadl-for-security-design-assurance-of-the-internet-of-things-poster-sei-2015-research-review/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/generalized-automated-cyber-readiness-evaluator-poster-sei-2015-research-review/</loc><lastmod>2023-10-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/graph-algorithms-on-future-architectures-poster-sei-2015-research-review/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/human-computer-decision-systems-poster-sei-2015-research-review/</loc><lastmod>2024-02-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/improving-software-sustainability-through-data-driven-technical-debt-management-poster-sei-2015-research-review/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/increase-adoption-of-secure-coding-standards-poster-sei-2015-research-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/incremental-lifecycle-assurance-of-critical-systems-poster-sei-2015-research-review/</loc><lastmod>2023-11-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/machine-learning-for-big-data-system-acquisition-poster-sei-2015-research-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/open-source-aadl-workbench-for-virtual-system-integration-poster-sei-2015-research-review/</loc><lastmod>2025-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/quantifying-uncertainty-in-early-lifecycle-cost-estimation-poster-sei-2015-research-review/</loc><lastmod>2024-04-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/runtime-assurance-for-big-data-systems-poster-sei-2015-research-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/verifying-distributed-adaptive-real-time-dart-systems-poster-sei-2015-research-review/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/vulnerability-discovery-poster-sei-2015-research-review/</loc><lastmod>2024-02-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mbalthe-model-based-assurance-lab/</loc><lastmod>2024-06-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/research-to-operations/</loc><lastmod>2024-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/incremental-lifecycle-assurance-of-critical-systems/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-assurance-of-security-policy-enforcement/</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/verifying-distributed-adaptive-real-dart-systems/</loc><lastmod>2024-03-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/auto-active-verification-of-software-with-timers-and-clocks/</loc></url><url><loc>https://www.sei.cmu.edu/library/property-directed-test-case-generation/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-technical-debt-to-improve-software-sustainability/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/artist-rendering-of-keynote-architecture-and-the-evolution-of-complex-systems/</loc><lastmod>2024-07-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/evaluation-of-threat-modeling-methodologies/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-serious-games/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/why-did-the-robot-do-that/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tactical-computing-and-communications-tcc/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-cyber-readiness-evaluator/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/semiconductor-foundry-verification/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tactical-analytics/</loc></url><url><loc>https://www.sei.cmu.edu/library/enabling-evidence-based-modernization/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/workplace-violence-and-it-sabotage/</loc><lastmod>2024-03-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/vulnerability-discovery/</loc><lastmod>2024-01-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/prioritizing-alerts-from-static-analysis-with-classification-models/</loc></url><url><loc>https://www.sei.cmu.edu/library/establishing-coding-requirements-for-non-safety-critical-c/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-code-repair/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphblas/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/developing-and-ibm-watson-cognitive-processing-application/</loc><lastmod>2024-02-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/reducing-insider-threat-through-positive-incentives/</loc><lastmod>2024-01-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/data-validation-for-large-scale-analytics/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-engineering-for-additive-manufacturing/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/human-computer-decision-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/statistical-model-checking-for-swarms/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/multi-agent-decentralized-planning-for-adversarial-robotic-teams/</loc><lastmod>2024-01-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/getting-contractors-to-cooperate/</loc></url><url><loc>https://www.sei.cmu.edu/library/two-perspectives-on-iot-security/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-assurance-of-security-policy-enforcement-2017/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-code-generation-for-high-performance-future-compatible-graph-libraries-2017/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-code-generation-for-high-performance-future-compatible-graph-libraries/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/certifiable-distributed-runtime-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-affordance-visualization-in-augmented-reality/</loc></url><url><loc>https://www.sei.cmu.edu/library/dynamic-design-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/events-relationships-and-script-learning-for-situational-awareness/</loc></url><url><loc>https://www.sei.cmu.edu/library/foundations-for-summarizing-and-learning-latent-structure-in-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/guided-architecture-trade-space-exploration-for-safety-critical-software-systems/</loc><lastmod>2024-12-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/inference-of-memory-bounds/</loc></url><url><loc>https://www.sei.cmu.edu/library/measuring-performance-of-big-learning-workloads/</loc></url><url><loc>https://www.sei.cmu.edu/library/obsidian-a-safer-blockchain-programming-language-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/rapid-expansion-of-classification-models-to-prioritize-static-analysis-alerts-for-c/</loc><lastmod>2023-10-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/technical-debt-analysis-through-software-analytics/</loc></url><url><loc>https://www.sei.cmu.edu/library/technical-detection-of-intended-violence-against-self-or-others/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-will-the-robot-do-next/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-does-software-cost-so-much-towards-a-causal-model/</loc></url><url><loc>https://www.sei.cmu.edu/library/micro-expressions-more-than-meets-the-eye/</loc></url><url><loc>https://www.sei.cmu.edu/library/guided-architecture-trade-space-exploration-of-safety-critical-systems/</loc><lastmod>2024-02-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-novel-approach-to-emotion-recognition-from-voice/</loc></url><url><loc>https://www.sei.cmu.edu/library/automatically-understanding-executables/</loc></url><url><loc>https://www.sei.cmu.edu/library/causal-models-for-software-cost-control-scope/</loc></url><url><loc>https://www.sei.cmu.edu/library/automatic-code-generation-for-graph-algorithms/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-code-repair-to-ensure-memory-safety-2018/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-a-cots-benchmark-baseline-for-graph-analytics/</loc></url><url><loc>https://www.sei.cmu.edu/library/certifiable-distributed-runtime-assurance-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/high-assurance-software-defined-iot-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/infrastructure-as-code/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrated-safety-and-security-engineering-for-mission-critical-systems-2018/</loc></url><url><loc>https://www.sei.cmu.edu/library/modeling-and-explaining-sequential-behavior/</loc></url><url><loc>https://www.sei.cmu.edu/library/modeling-the-operations-of-the-vulnerability-ecosystem/</loc></url><url><loc>https://www.sei.cmu.edu/library/predicting-security-flaws-through-architectural-flaws/</loc></url><url><loc>https://www.sei.cmu.edu/library/rapid-construction-of-accurate-automatic-alert-handling/</loc></url><url><loc>https://www.sei.cmu.edu/library/rapid-software-composition-by-assessing-untrusted-components/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/summarizing-and-searching-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/data-driven-technical-debt-analysis/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/timing-verification-of-undocumented-multicore/</loc></url><url><loc>https://www.sei.cmu.edu/library/towards-security-defect-prediction-with-ai/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-series-of-unlikely-events/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-code-repair-to-ensure-memory-safety-in-c-source-code-2019/</loc></url><url><loc>https://www.sei.cmu.edu/library/field-stripping-a-weapons-system-building-a-trustworthy-computer/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-series-of-unlikely-events-learning-patterns-by-observing-sequential-behavior/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-code-repair-to-ensure-memory-safety-2019/</loc></url><url><loc>https://www.sei.cmu.edu/library/causal-models-for-software-cost-prediction-control/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/emotion-recognition-from-voice-in-the-wild/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrating-safety-and-security-engineering-for-mission-critical-systems-2019/</loc></url><url><loc>https://www.sei.cmu.edu/library/kalki-high-assurance-software-defined-iot-security/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/graph-convolutional-neural-networks/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/projecting-quantum-computational-advantage-versus-classical-state-of-the-art/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/rapid-certifiable-trust/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/rapid-construction-of-accurate-automatic-alert-handling-system-2019/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/spiralaiml-frontiers-of-graph-processing-in-linear-algebra/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/untangling-the-knot-recommending-component-refactorings/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/summarizing-and-searching-video-domain-adaptation/</loc></url><url><loc>https://www.sei.cmu.edu/library/summarizing-and-searching-video-geometry-aware-visual-surveillance/</loc></url><url><loc>https://www.sei.cmu.edu/library/summarizing-and-searching-video-patterns-of-life-analysis/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-all-processor-cores-while-being-confident-about-timing/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/spiralaiml-frontiers-of-graph-processing-in-linear-algebra-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/recovering-meaningful-variable-names-in-decompiled-code/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/poster-a-series-of-unlikely-events/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-characterizing-and-detecting-mismatch-in-ml-enabled-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-human-decision-making-with-ai-support/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-video-summarization-and-search-object-tracking/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-quantum-advantage-evaluation-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-co-optimization-for-high-performance-data-intensive-computing-in-resource-constrained-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-train-but-verify-towards-practical-ai-robustness/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-automated-code-repair-to-ensure-memory-safety-2020/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-improvements-to-object-oriented-construct-recovery-using-ooanalyzer/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-program-reachability-for-vulnerability-and-malware-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-recovering-meaningful-variable-names-in-decompiled-code/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/about-the-presidents-cup-cybersecurity-competition/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-causal-models-for-software-cost-prediction-and-control/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-kalki-high-assurance-software-defined-iot-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-integrated-safety-and-security-engineering-for-mission-critical-systems-2020/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-using-all-processor-cores-while-being-confident-about-timing/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-rapid-certifiable-trust/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-twinops-digital-twins-meet-devops/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-untangling-the-knot/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-automated-design-conformance-during-continuous-integration/</loc></url><url><loc>https://www.sei.cmu.edu/library/poster-rapid-adjudication-of-static-analysis-meta-alerts-during-continuous-integration/</loc></url><url><loc>https://www.sei.cmu.edu/library/untangling-the-knot-enabling-rapid-software-evolution/</loc></url><url><loc>https://www.sei.cmu.edu/library/enriching-honeypot-data-using-cyber-threat-intelligence/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cloud-maturity-benchmarking-survey/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-taxonomy-of-cyber-attacks-in-smart-manufacturing-systems-through-the-perspective-of-the-nist-cybersecurity-framework-manufacturing-profile/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-welcome-to-devsecops-days-pittsburgh-2022/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-nohobbyists/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-are-we-forever-doomed-by-software-supply-chain-risks/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-chaos-security-engineering-integrating-security-through-chaos/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-how-to-misuse-and-abuse-dora-metrics/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-implementing-pipelines-to-automate-container-maintenance-in-highly-regulated-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-devsecops-in-the-cloud-from-the-lens-of-a-well-architected-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-devsecops-are-we-there-yet/</loc></url><url><loc>https://www.sei.cmu.edu/library/securing-network-servers-2000/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/securing-public-web-servers/</loc></url><url><loc>https://www.sei.cmu.edu/library/outsourcing-managed-security-services/</loc></url><url><loc>https://www.sei.cmu.edu/library/support-materials-for-the-software-technical-review-process/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/detecting-signs-of-intrusion/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-for-information-technology-service-contracts/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/preparing-to-detect-signs-of-intrusion/</loc></url><url><loc>https://www.sei.cmu.edu/library/securing-desktop-workstations/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/responding-to-intrusions/</loc></url><url><loc>https://www.sei.cmu.edu/library/securing-network-servers-1999/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/deploying-firewalls/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-prism/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-ipa/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-isilk/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-netsa-python/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-orcus/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-analysis-and-design-language-aadl-tool/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-strategy-development-tool/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/kd-cloudlet/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/madara/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/bgpuma/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/big-grep/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-bff/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mcda/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-cif2stix/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-dranzer/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mzsrm/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-fixbuf/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/nabu/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/osate/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/pdfrankenstein/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/pharos/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/quabasebd/</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-jira-plugins/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/rosecheckers/</loc><lastmod>2023-10-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/seahorn/</loc><lastmod>2023-10-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-validation-suite/</loc><lastmod>2023-10-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-pyfixbuf/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-rayon/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-silk/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-silk-ipset/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-snarf/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-square-for-acquisition-a-square/</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-square-for-privacy-p-square/</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-stix2cif/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-super_mediator/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/spacer/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/clang/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-yaf/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/didfail/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-tapioca/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dmplc/</loc><lastmod>2024-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/eraces/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/gams/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/compiler-enforced-buffer-overflow-elimination/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/gbtl/</loc><lastmod>2023-10-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/controls-systems-code-samples-download/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/copper/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-test-dataset/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dart/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-foe/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-triage-tools/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ghosts/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/welle-d/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/vtunnel/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/greybox/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/topgen/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/topomojo/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/foundry/</loc><lastmod>2024-04-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/analysis-pipeline/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/clang-tidy/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-assurance-of-security-policy-enforcement-aaspe/</loc><lastmod>2023-10-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/error-model-version-2/</loc><lastmod>2023-10-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/scaife-api-yaml-specification/</loc><lastmod>2023-09-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/crucible/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/supplementary-materials-for-a-case-study-of-analysis-contracts-with-the-active-tool/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dsoi-all-devops-microcosm/</loc><lastmod>2024-01-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mission-based-prioritization-tool-code-free/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mission-based-prioritization-tool-coded/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/kalki-platform-main-repository/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-ace/</loc><lastmod>2023-10-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-1999-survey-of-high-maturity-organizations/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-november-1999-high-maturity-workshop/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-2001-high-maturity-workshop/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/army-workshop-on-lessons-learned-from-software-upgrade-programs/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-real-time-systems-engineering-workshop/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/framework-document-model-based-verification-pilot-study/</loc><lastmod>2024-06-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/reeducation-to-expand-the-software-engineering-workforce-successful-industryuniversity-collaborations/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-report-on-the-may-2002-cmmi-workshop/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tracking-and-tracing-cyber-attacks-technical-challenges-and-global-policy-issues/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-the-technology-readiness-levels-scale-to-support-technology-management-in-the-dods-atdsto-environments-a-findings-and-recommendations-report-conducted-for-army-cecom/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/international-liability-issues-for-software-quality/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/third-international-workshop-on-adoption-centric-software-engineering/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-interpretive-guidance-project-preliminary-report/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/demonstrating-the-impact-and-benefits-of-cmmi-an-update-and-preliminary-results/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/standard-systems-group-ssg-technology-adoption-planning-workshop/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-interpretive-guidance-project-what-we-learned/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/code-of-professional-conduct-for-sei-services-version-10/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/benefits-of-improvement-efforts/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-based-professional-certifications-the-competency-lifecycle-framework/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/systems-quality-requirements-engineering-square-methodology-case-study-on-asset-management-system/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/interpreting-scampi-for-a-people-cmm-appraisal-at-tata-consultancy-services/</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/us-army-acquisition-the-program-executive-officer-perspective/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-personal-software-process-psp-body-of-knowledge-version-10/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/system-quality-requirements-engineering-square-case-study-on-asset-management-system-phase-ii/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/report-on-annual-regional-information-assurance-symposia/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/building-information-assurance-educational-capacity-pilot-efforts-to-date/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/case-study-accelerating-process-improvement-by-integrating-the-tsp-and-cmmi/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-first-international-research-workshop-for-process-improvement-in-small-settings-2005/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/r2pl-2005-proceedings-of-the-first-international-workshop-on-reengineering-towards-product-lines/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/security-quality-requirements-engineering-square-case-study-phase-iii/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/adapting-cmmi-for-acquisition-organizations-a-preliminary-report/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/information-assurance-building-educational-capacity/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/global-information-grid-survivability-four-studies/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/army-assip-system-of-systems-test-metrics-task/</loc><lastmod>2025-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-examination-of-a-structural-modeling-risk-probe-technique/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-survey-of-systems-engineering-effectiveness-initial-results/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/assip-study-of-real-time-safety-critical-embedded-software-intensive-system-engineering-practices/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-first-workshop-on-service-oriented-architectures-and-product-lines/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-international-workshop-on-the-foundations-of-service-oriented-architecture-fsoa-2007/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/square-lite-case-study-on-vadsoft-project/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-survey-of-systems-engineering-effectiveness-initial-results-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/multi-view-decision-making-mvdm-workshop/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/making-the-business-case-for-software-assurance/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-initial-comparative-analysis-of-the-cmmi-version-12-development-constellation-and-the-iso-9000-family/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/impact-of-army-architecture-evaluations/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/incorporating-software-requirements-into-the-system-rfp-survey-of-rfp-language-for-software-by-topic-v-20/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-workshop-on-software-engineering-foundations-for-end-user-programming-seeup-2009/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/privacy-risk-assessment-case-studies-in-support-of-square/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-personal-software-process-psp-body-of-knowledge-version-20/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insights-on-program-success/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-watts-new-collection-columns-by-the-seis-watts-humphrey/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-bibliography-of-the-personal-software-process-psp-and-the-team-software-process-tsp/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/best-practices-for-national-cyber-security-building-a-national-computer-security-incident-management-capability/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/team-software-process-tsp-coach-mentoring-program-guidebook-version-11/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-framework-for-evaluating-common-operating-environments-piloting-lessons-learned-and-opportunities/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/trusted-computing-in-embedded-systems-workshop/</loc><lastmod>2024-01-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/issues-and-opportunities-for-improving-the-quality-and-use-of-data-in-the-department-of-defense/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/standards-based-automated-remediation-a-remediation-manager-reference-implementation/</loc><lastmod>2024-01-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-fourth-international-workshop-on-a-research-agenda-for-maintenance-and-evolution-of-service-oriented-systems-mesoa-2010/</loc></url><url><loc>https://www.sei.cmu.edu/library/whats-new-in-v2-of-the-architecture-analysis-design-language-standard/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-closer-look-at-804-a-summary-of-considerations-for-dod-program-managers/</loc></url><url><loc>https://www.sei.cmu.edu/library/standards-based-automated-remediation-a-remediation-manager-reference-implementation-2011-update/</loc></url><url><loc>https://www.sei.cmu.edu/library/conference-report-overcoming-the-disincentives-to-modernization-in-the-defense-industry/</loc></url><url><loc>https://www.sei.cmu.edu/library/continuing-education-in-software-engineering-teaching-tricks-of-the-tradeseptember-1989/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/conformance-criteria-for-the-same-approach-to-binding-ada-programs-to-sql/</loc></url><url><loc>https://www.sei.cmu.edu/library/recommendations-from-the-aiasei-workshop-on-research-advances-required-for-real-time-software-systems-in-the-1990s/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-domain-analysis-bibliography/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-context-analysis-of-the-movement-control-domain-for-the-army-tactical-command-and-control-system-atccs/</loc></url><url><loc>https://www.sei.cmu.edu/library/report-on-senior-executive-seminars-on-software-issues/</loc></url><url><loc>https://www.sei.cmu.edu/library/joint-integrated-avionics-working-group-jiawg-object-oriented-domain-analysis-method-joda/</loc></url><url><loc>https://www.sei.cmu.edu/library/dependable-software-technology-exchange/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/reengineering-an-engineering-problem/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-software-process-framework-for-the-sei-capability-maturity-model-repeatable-level/</loc></url><url><loc>https://www.sei.cmu.edu/library/results-of-a-workshop-on-research-in-incident-handling/</loc></url><url><loc>https://www.sei.cmu.edu/library/process-guide-for-the-domain-specific-software-architectures-dssa-process-life-cycle/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-introduction-to-team-risk-management-version-10/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/maturity-questionnaire/</loc></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-first-annual-software-engineering-techniques-workshop-september-1994-software-reengineering/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/benefits-of-cmm-based-software-process-improvement-executive-summary-of-initial-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-managers-checklist-for-validating-software-cost-and-schedule-estimates/</loc></url><url><loc>https://www.sei.cmu.edu/library/checklists-and-criteria-for-evaluating-the-cost-and-schedule-estimating-capabilities-of-software-organizations/</loc></url><url><loc>https://www.sei.cmu.edu/library/domain-analysis-workshop-report-for-the-automated-prompt-and-response-system-domain/</loc></url><url><loc>https://www.sei.cmu.edu/library/directory-of-industry-and-university-collaborations-with-a-focus-on-software-engineering-education-version-5/</loc></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-introducing-requirements-management-into-organizations-workshop-requirements-management-transition-packages-november-11-13-1996/</loc></url><url><loc>https://www.sei.cmu.edu/library/report-to-the-presidents-commission-on-critical-infrastructure-protection/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-to-use-the-software-process-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/report-of-the-step-97-workshop-on-net-centric-computing/</loc></url><url><loc>https://www.sei.cmu.edu/library/directory-of-industry-and-university-collaborations-with-a-focus-on-software-engineering-education-and-training-version-6/</loc></url><url><loc>https://www.sei.cmu.edu/library/perceived-control-of-software-developers-and-its-impact-on-the-successful-diffusion-of-information-technology/</loc></url><url><loc>https://www.sei.cmu.edu/library/analysis-of-courses-in-information-management-and-network-system-security-and-survivability/</loc></url><url><loc>https://www.sei.cmu.edu/library/quotations-from-chairman-david-little-red-book-truths-enlighten-guide-long-march-toward-cots-revolution/</loc><lastmod>2026-01-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-study-illicit-cyber-activity-involving-fraud-in-the-us-financial-services-sector/</loc></url><url><loc>https://www.sei.cmu.edu/library/sepg-europe-2012-conference-proceedings/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-business-case-for-systems-engineering-study-assessing-project-performance-from-sparse-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-business-case-for-systems-engineering-study-results-of-the-systems-engineering-effectiveness-survey/</loc></url><url><loc>https://www.sei.cmu.edu/library/reliability-improvement-and-validation-framework/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2012-proceedings/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/socio-adaptive-systems-challenge-problems-workshop-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-performance-and-capability-evaluation-pace-team-preparedness-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-performance-and-capability-evaluation-pace-customer-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-model-solution-for-c3i-message-translation-and-validation/</loc></url><url><loc>https://www.sei.cmu.edu/library/best-practices-in-wireless-emergency-alerts/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/maximizing-trust-in-the-wireless-emergency-alerts-wea-service/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/wireless-emergency-alerts-trust-model-simulations/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/study-of-integration-strategy-considerations-for-wireless-emergency-alerts/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/wireless-emergency-alerts-wea-cybersecurity-risk-management-strategy-for-alert-originators/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2013-proceedings/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-business-case-for-systems-engineering-comparison-of-defense-domain-and-non-defense-projects/</loc></url><url><loc>https://www.sei.cmu.edu/library/assuring-software-reliability/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/development-of-an-intellectual-property-strategy-research-notes-to-support-department-of-defense-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/potential-system-integration-issues-in-the-joint-multi-role-jmr-joint-common-architecture-jca-demonstration-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/requirements-and-architecture-specification-of-the-joint-multi-role-jmr-joint-common-architecture-jca-demonstration-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-led-safety-analysis-of-the-joint-multi-role-jmr-joint-common-architecture-jca-demonstration-system/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/intelligence-preparation-for-operational-resilience-ipor/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-culture-early-warning-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/report-writer-and-security-requirements-finder-user-and-admin-manuals/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/wireless-emergency-alerts-commercial-mobile-service-provider-cmsp-cybersecurity-guidelines/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/rfp-patterns-and-techniques-for-successful-agile-contracting/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-technical-history-of-the-sei/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/security-of-the-internet/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/systemic-vulnerabilities-in-customer-premises-equipment-cpe-routers/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-cert-guide-to-coordinated-vulnerability-disclosure-2/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-mutual-assistance-workshop-report/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/fedclass-a-case-study-of-agile-and-lean-practices-in-the-federal-government/</loc></url><url><loc>https://www.sei.cmu.edu/library/dod-developers-guidebook-for-software-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/program-managers-guidebook-for-software-assurance/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ai-engineering-for-defense-and-national-security-a-report-from-the-october-2019-community-of-interest-workshop/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-driven-semantic-analysis-of-embedded-systems-dagstuhl-seminar-12272/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-state-based-model-for-multi-party-coordinated-vulnerability-disclosure-mpcvd/</loc></url><url><loc>https://www.sei.cmu.edu/library/guidance-for-tailoring-dod-request-for-proposals-rfps-to-include-modeling/</loc><lastmod>2024-10-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/designing-vultron-a-protocol-for-multi-party-coordinated-vulnerability-disclosure-mpcvd/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-strategy-for-component-product-lines-report-1-scoping-objectives-and-rationale/</loc><lastmod>2023-12-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/basic-concepts-of-product-line-practice-for-the-dod/</loc></url><url><loc>https://www.sei.cmu.edu/library/modeling-the-space-shuttle-liquid-hydrogen-subsystem/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-survey-of-legacy-system-modernization-approaches/</loc></url><url><loc>https://www.sei.cmu.edu/library/guidelines-for-using-oar-concepts-in-a-dod-product-line-acquisition-environment/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-the-architecture-tradeoff-analysis-method-to-evaluate-a-reference-architecture-a-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/mining-existing-assets-for-software-product-lines/</loc></url><url><loc>https://www.sei.cmu.edu/library/active-reviews-for-intermediate-designs/</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-quality-attribute-workshops-to-evaluate-architectural-design-approaches-in-a-major-system-acquisition-a-case-study/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/k-bacee-a-knowledge-based-automated-component-ensemble-evaluation-tool/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/quality-attribute-design-primitives/</loc></url><url><loc>https://www.sei.cmu.edu/library/attack-modeling-for-information-security-and-survivability/</loc></url><url><loc>https://www.sei.cmu.edu/library/real-time-systems-engineering-lessons-learned-from-independent-technical-assessments/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/incremental-modernization-for-legacy-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/volume-i-market-assessment-of-component-based-software-engineering-assessments/</loc></url><url><loc>https://www.sei.cmu.edu/library/architectural-refinement-for-the-design-of-survivable-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/use-of-the-atam-in-the-acquisition-of-software-intensive-systems/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/documenting-software-architectures-organization-of-documentation-package/</loc></url><url><loc>https://www.sei.cmu.edu/library/dod-software-migration-planning/</loc></url><url><loc>https://www.sei.cmu.edu/library/options-analysis-for-reengineering-oar-a-method-for-mining-legacy-assets/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-reconstruction-to-support-a-product-line-effort-case-study/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/beyond-the-black-box-a-case-study-in-c-to-java-conversion-and-product-extensibility/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-based-verification-claim-creation-guidelines/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/case-study-building-and-communicating-a-business-case-for-a-dod-product-line/</loc></url><url><loc>https://www.sei.cmu.edu/library/developing-a-product-line-acquisition-strategy-for-a-dod-organization-a-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-the-architecture-tradeoff-analysis-method-to-evaluate-a-wargame-simulation-system-a-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-based-verification-scope-formalism-and-perspective-guidelines/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/analyzing-enterprise-javabeans-systems-using-quality-attribute-design-primitives/</loc></url><url><loc>https://www.sei.cmu.edu/library/experiences-in-implementing-measurement-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-based-verification-analysis-guidelines/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/can-we-ever-build-survivable-systems-from-cots-components/</loc></url><url><loc>https://www.sei.cmu.edu/library/documenting-software-architecture-documenting-behavior/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-software-product-line-vision-for-defense-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-based-verification-guidelines-for-generating-expected-properties/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/experiences-in-architecture-reconstruction-at-nokia/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-architecture-analysis-techniques-and-when-to-use-them/</loc></url><url><loc>https://www.sei.cmu.edu/library/interpreting-capability-maturity-model-integration-cmmi-for-operational-organizations/</loc></url><url><loc>https://www.sei.cmu.edu/library/map-and-oar-methods-techniques-for-developing-core-assets-for-software-product-lines-from-existing-assets/</loc></url><url><loc>https://www.sei.cmu.edu/library/scampi-v11-use-in-supplier-selection-and-contract-process-monitoring/</loc><lastmod>2025-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/replaceable-components-and-the-service-provider-interface/</loc></url><url><loc>https://www.sei.cmu.edu/library/use-of-the-architecture-tradeoff-analysis-method-atam-in-source-selection-of-software-intensive-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-based-verification-abstraction-guidelines/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-process-improvement-and-product-line-practice-cmmi-and-the-framework-for-software-product-line-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/use-of-quality-attribute-workshops-qaws-in-source-selection-for-a-dod-system-acquisition-a-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/documenting-software-architecture-documenting-interfaces/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-cmmi-to-improve-earned-value-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/product-line-state-of-the-practice-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/successful-product-line-development-and-sustainment-a-dod-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/flow-service-quality-fsq-engineering-foundations-for-network-system-analysis-and-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/pamd-developing-a-plug-in-architecture-for-palm-os-powered-devices-using-software-engineering/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/supporting-the-cancel-command-through-software-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/plug-in-architecture-for-mobile-devices/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-basis-for-composition-language-cl/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-application-of-an-iterative-approach-to-dod-software-migration-planning/</loc></url><url><loc>https://www.sei.cmu.edu/library/product-line-production-planning-for-the-home-integration-system-example/</loc></url><url><loc>https://www.sei.cmu.edu/library/pect-infrastructure-a-rough-sketch/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/on-the-suitability-of-tcltk-for-sys/</loc></url><url><loc>https://www.sei.cmu.edu/library/rendering-tcltk-windows-as-html/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-fsq-engineering-foundations-to-automated-calculation-of-program-behavior/</loc></url><url><loc>https://www.sei.cmu.edu/library/real-time-application-development-with-osek-a-review-of-the-osek-standards/</loc></url><url><loc>https://www.sei.cmu.edu/library/dod-architecture-framework-and-software-architecture-workshop-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-federation-object-model-fom-flexible-federate-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-reconstruction-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/application-of-options-analysis-for-reengineering-in-a-lead-system-integrator-environment/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-relationships-between-small-manufacturing-enterprises-and-vendors-findings-from-the-tide-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-the-architecture-tradeoff-analysis-method-atam-to-evaluate-the-software-architecture-for-a-product-line-of-avionics-systems-a-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/requirements-engineering-for-survivable-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmm-based-process-improvement-and-schedule-deviation-in-software-maintenance/</loc></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-system-of-systems-interoperability-workshop-february-2003/</loc></url><url><loc>https://www.sei.cmu.edu/library/predicting-when-product-line-investment-pays/</loc></url><url><loc>https://www.sei.cmu.edu/library/selecting-advanced-software-technology-in-two-small-manufacturing-enterprises/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-about-ada-the-state-of-the-technology-in-2003/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/documenting-software-architectures-in-an-agile-world/</loc></url><url><loc>https://www.sei.cmu.edu/library/deriving-enterprise-based-measures-using-the-balanced-scorecard-and-goal-driven-measurement-techniques/</loc></url><url><loc>https://www.sei.cmu.edu/library/snapshot-of-ccl-a-language-for-predictable-assembly/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-life-cycle-view-of-architecture-analysis-and-design-methods/</loc></url><url><loc>https://www.sei.cmu.edu/library/dod-experience-with-the-c4isr-architecture-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-reconstruction-of-j2ee-applications-generating-views-from-the-module-viewtype/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-software-engineering-institutes-second-workshop-on-predictable-assembly-landscape-of-compositional-predictability/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-template-for-documenting-prediction-enabled-component-technologies/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measures-for-software-product-lines/</loc></url><url><loc>https://www.sei.cmu.edu/library/common-concepts-underlying-safety-security-and-survivability-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrating-the-architecture-tradeoff-analysis-method-atam-with-the-cost-benefit-analysis-method-cbam/</loc></url><url><loc>https://www.sei.cmu.edu/library/cots-acquisition-evaluation-process-preachers-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/measuring-systems-interoperability-challenges-and-opportunities/</loc></url><url><loc>https://www.sei.cmu.edu/library/survivable-functional-units-balancing-an-enterprises-mission-and-technology/</loc></url><url><loc>https://www.sei.cmu.edu/library/embedded-systems-architecture-analysis-using-sae-aadl/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-product-lines-experiences-from-the-sixth-dod-software-product-line-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-study-of-product-production-in-software-product-lines/</loc></url><url><loc>https://www.sei.cmu.edu/library/risk-based-diagnostics/</loc></url><url><loc>https://www.sei.cmu.edu/library/dependability-cases/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/integrating-the-quality-attribute-workshop-qaw-and-the-attribute-driven-design-add-method/</loc></url><url><loc>https://www.sei.cmu.edu/library/overview-of-comfort-a-model-checking-reasoning-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/assumptions-management-in-software-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-and-survivability-reasoning-frameworks-and-architectural-design-tactics/</loc></url><url><loc>https://www.sei.cmu.edu/library/case-study-a-measurement-program-for-product-lines/</loc></url><url><loc>https://www.sei.cmu.edu/library/applications-of-the-indicator-template-for-measurement-and-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/illuminating-patterns-of-perception-an-overview-of-q-methodology/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-model-problem-for-an-open-robotics-controller/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-component-certification-10-useful-distinctions/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrating-software-architecture-centric-methods-into-extreme-programming-xp/</loc></url><url><loc>https://www.sei.cmu.edu/library/creating-and-using-software-architecture-documentation-using-web-based-tool-support/</loc></url><url><loc>https://www.sei.cmu.edu/library/promising-technologies-for-future-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-process-improvement-and-product-line-practice-building-on-your-process-improvement-infrastructure/</loc></url><url><loc>https://www.sei.cmu.edu/library/square-project-costbenefit-analysis-framework-for-information-security-improvement-projects-in-small-companies/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-for-enterprise-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/pin-component-technology-v10-and-its-c-interface/</loc></url><url><loc>https://www.sei.cmu.edu/library/topics-in-interoperability-system-of-systems-evolution/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-structured-approach-to-classifying-security-vulnerabilities/</loc></url><url><loc>https://www.sei.cmu.edu/library/relationships-between-cmmi-and-six-sigma/</loc></url><url><loc>https://www.sei.cmu.edu/library/eliciting-and-analyzing-quality-requirements-management-influences-on-software-quality-requirements/</loc></url><url><loc>https://www.sei.cmu.edu/library/safety-critical-systems-and-the-tsp/</loc></url><url><loc>https://www.sei.cmu.edu/library/quality-attributes-and-service-oriented-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/robustness-testing-of-software-intensive-systems-explanation-and-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-earned-value-management-evm-in-spiral-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/comparing-the-seis-views-and-beyond-approach-for-documenting-software-architectures-with-ansi-ieee-1471-2000/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-in-dod-acquisition-an-approach-and-language-for-a-software-development-plan/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-in-dod-acquisition-a-reference-standard-for-a-software-architecture-document/</loc></url><url><loc>https://www.sei.cmu.edu/library/information-asset-profiling/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-problems-in-technologies-for-interoperability-model-driven-architecture/</loc><lastmod>2024-07-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/governing-for-enterprise-security/</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-software-development-life-cycle-processes-a-technology-scouting-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-process-for-context-based-technology-evaluation/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-the-sei-architecture-tradeoff-analysis-method-to-evaluate-win-t-a-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/product-line-adoption-in-a-cmmi-environment/</loc></url><url><loc>https://www.sei.cmu.edu/library/smart-the-service-oriented-migration-and-reuse-technique/</loc></url><url><loc>https://www.sei.cmu.edu/library/elements-of-a-usability-reasoning-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/topics-in-interoperability-infrastructure-replacement-in-a-system-of-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/mission-assurance-analysis-protocol-maap-assessing-risk-in-complex-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/some-current-approaches-to-interoperability/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrated-diagnostics-operational-missions-diagnostic-types-characteristics-and-capability-gaps/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-taxonomy-of-operational-risks/</loc></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-first-software-architecture-technology-user-network-saturn-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/lessons-learned-model-checking-an-industrial-communications-library/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-containers-to-enforce-smart-constraints-for-performance-in-industrial-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/experience-using-the-web-based-tool-wiki-for-architecture-documentation/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/exploring-programmatic-interoperability-army-future-force-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-vulnerabilities-in-java/</loc></url><url><loc>https://www.sei.cmu.edu/library/topics-in-interoperability-concepts-of-ownership-and-their-significance-in-systems-of-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-cert-function-extraction-experiment-quantifying-fx-impact-on-software-comprehension-and-verification/</loc></url><url><loc>https://www.sei.cmu.edu/library/acquiring-evolving-technologies-web-services-standards/</loc></url><url><loc>https://www.sei.cmu.edu/library/sat-based-software-certification/</loc></url><url><loc>https://www.sei.cmu.edu/library/autonomic-computing/</loc></url><url><loc>https://www.sei.cmu.edu/library/sustaining-software-intensive-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/sustaining-operational-resiliency-a-process-improvement-approach-to-security-management/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/applying-octave-practitioners-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-architecture-analysis-design-language-aadl-an-introduction/</loc></url><url><loc>https://www.sei.cmu.edu/library/on-system-scalability/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/toward-measures-for-software-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/common-elements-of-risk/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/requirements-management-in-a-system-of-systems-context-a-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/proxy-based-estimation-probe-for-structured-query-language-sql/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-problems-in-technologies-for-interoperability-owl-web-ontology-language-for-services-owl-s/</loc></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-navigator-an-approach-for-managing-system-of-systems-interoperability/</loc></url><url><loc>https://www.sei.cmu.edu/library/product-line-acquisition-in-a-dod-organizational-guidance-for-decision-makers/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-problems-in-technologies-for-interoperability-web-services/</loc></url><url><loc>https://www.sei.cmu.edu/library/specifying-initial-design-review-idr-and-final-design-review-fdr-criteria/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/quantitative-methods-for-software-selection-and-evaluation/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/evolutionary-systems-design-recognizing-changes-in-security-and-survivability-risks/</loc></url><url><loc>https://www.sei.cmu.edu/library/assume-guarantee-reasoning-for-deadlock/</loc></url><url><loc>https://www.sei.cmu.edu/library/joint-capabilities-and-system-of-systems-solutions-a-case-for-crossing-solution-domains/</loc></url><url><loc>https://www.sei.cmu.edu/library/certifying-the-absence-of-buffer-overflows/</loc></url><url><loc>https://www.sei.cmu.edu/library/workshop-on-model-driven-architecture-and-program-generation/</loc></url><url><loc>https://www.sei.cmu.edu/library/risk-management-considerations-for-interoperable-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/interoperable-acquisition-for-systems-of-systems-the-challenges/</loc></url><url><loc>https://www.sei.cmu.edu/library/schedule-considerations-for-interoperable-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-governance-new-patterns-of-thought/</loc></url><url><loc>https://www.sei.cmu.edu/library/topics-in-interoperability-structural-programmatics-in-a-system-of-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-proposed-taxonomy-for-software-development-risks-for-high-performance-computing-hpc-scientificengineering-applications/</loc></url><url><loc>https://www.sei.cmu.edu/library/modeling-and-analysis-of-information-technology-change-and-access-controls-in-the-business-context/</loc></url><url><loc>https://www.sei.cmu.edu/library/management-and-education-of-the-risk-of-insider-threat-merit-mitigating-the-risk-of-sabotage-to-employers-information-systems-or-networks/</loc></url><url><loc>https://www.sei.cmu.edu/library/case-study-of-the-nene-code-project/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-arche-in-the-classroom-one-experience/</loc></url><url><loc>https://www.sei.cmu.edu/library/basic-principles-and-concepts-for-achieving-quality-parent/</loc></url><url><loc>https://www.sei.cmu.edu/library/conditions-for-achieving-network-centric-operations-in-systems-of-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/executive-overview-of-sei-mosaic-managing-for-success-using-a-risk-based-approach/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-the-architecture-of-the-cmmi-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/flow-latency-analysis-with-the-architecture-analysis-and-design-language-aadl/</loc></url><url><loc>https://www.sei.cmu.edu/library/t-check-for-technologies-for-interoperability-open-grid-services-architecture-ogsapart-1-parent-sei-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-intensive-systems-producibility-a-vision-and-roadmap-v-01/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-aspect-oriented-programming-to-enforce-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/governing-for-enterprise-security-ges-implementation-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-to-compare-the-security-quality-requirements-engineering-square-method-with-other-methods/</loc></url><url><loc>https://www.sei.cmu.edu/library/process-improvement-should-link-to-security-sepg-2007-security-track-recap/</loc></url><url><loc>https://www.sei.cmu.edu/library/ranged-integers-for-the-c-programming-language/</loc></url><url><loc>https://www.sei.cmu.edu/library/dependability-modeling-with-the-architecture-analysis-design-language-aadl/</loc></url><url><loc>https://www.sei.cmu.edu/library/modeling-of-system-families/</loc></url><url><loc>https://www.sei.cmu.edu/library/sos-navigator-20-a-context-based-approach-to-system-of-systems-challenges/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-or-agile-why-not-embrace-both/</loc></url><url><loc>https://www.sei.cmu.edu/library/lessons-learned-applying-the-mission-diagnostic/</loc></url><url><loc>https://www.sei.cmu.edu/library/t-check-in-technologies-for-interoperability-business-process-management-in-a-web-services-context/</loc></url><url><loc>https://www.sei.cmu.edu/library/incorporating-security-quality-requirements-engineering-square-into-standard-life-cycle-models/</loc></url><url><loc>https://www.sei.cmu.edu/library/smart-analyzing-the-reuse-potential-of-legacy-components-in-a-service-oriented-architecture-environment/</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-roadmaps/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/preview-of-the-mission-assurance-analysis-protocol-maap-assessing-risk-and-opportunity-in-complex-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/programmatic-interoperability/</loc></url><url><loc>https://www.sei.cmu.edu/library/computer-forensics-results-of-live-response-inquiry-vs-memory-image-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/service-level-agreements-in-service-oriented-architecture-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/t-check-in-technologies-for-interoperability-web-services-and-securitysingle-sign-on/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-high-maturity-measurement-and-analysis-workshop-report-march-2008/</loc></url><url><loc>https://www.sei.cmu.edu/library/can-you-trust-your-data-establishing-the-need-for-a-measurement-and-analysis-infrastructure-diagnostic/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-proactive-means-for-incorporating-a-software-architecture-evaluation-in-a-dod-system-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-workshop-on-architecture-competence/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measurement-for-improvement-successful-measurement-practices-used-in-army-software-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-scenario-based-technique-for-developing-soa-technical-governance/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/generalized-criteria-and-evaluation-method-for-center-of-excellence-a-preliminary-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/lessons-learned-from-a-large-multi-segment-software-intensive-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/incremental-development-in-large-scale-systems-finding-the-programmatic-ieds/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-process-improvement-business-cases-using-bayesian-belief-networks-and-monte-carlo-simulation/</loc></url><url><loc>https://www.sei.cmu.edu/library/towards-an-assurance-case-practice-for-medical-devices/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/evaluating-artifact-quality-from-an-appraisal-perspective/</loc></url><url><loc>https://www.sei.cmu.edu/library/evaluating-process-quality-from-an-appraisal-perspective/</loc></url><url><loc>https://www.sei.cmu.edu/library/as-if-infinitely-ranged-integer-model/</loc></url><url><loc>https://www.sei.cmu.edu/library/data-model-as-an-architectural-view/</loc></url><url><loc>https://www.sei.cmu.edu/library/formulation-of-a-production-strategy-for-a-software-product-line/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-structured-approach-for-reviewing-architecture-documentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-method-for-assessing-technical-progress-and-quality-throughout-the-system-life-cycle/</loc></url><url><loc>https://www.sei.cmu.edu/library/profiling-systems-using-the-defining-characteristics-of-systems-of-systems-sos/</loc></url><url><loc>https://www.sei.cmu.edu/library/considerations-for-using-agile-in-dod-acquisition/</loc><lastmod>2024-01-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-research-agenda-for-service-oriented-architecture-soa-maintenance-and-evolution-of-service-oriented-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-variation-in-services-in-a-software-product-line-context/</loc></url><url><loc>https://www.sei.cmu.edu/library/as-if-infinitely-ranged-integer-model-second-edition/</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/t-check-in-system-of-systems-technologies-cloud-computing/</loc></url><url><loc>https://www.sei.cmu.edu/library/survivability-analysis-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/data-rights-for-proprietary-software-used-in-dod-programs/</loc><lastmod>2025-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/evaluating-and-mitigating-software-supply-chain-security-risks/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/relating-business-goals-to-architecturally-significant-requirements-for-software-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/emerging-technologies-for-software-reliant-systems-of-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/adapting-the-square-process-for-privacy-requirements-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-workshop-on-analysis-and-evaluation-of-enterprise-architectures/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/integrated-measurement-and-analysis-framework-for-software-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-supply-chain-risk-management-from-products-to-systems-of-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-requirements-reusability-and-the-square-methodology/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-taxonomy-of-operational-cyber-security-risks/</loc></url><url><loc>https://www.sei.cmu.edu/library/measuring-operational-resilience-using-the-cert-resilience-management-model/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/agile-methods-selected-dod-management-and-acquisition-concerns/</loc></url><url><loc>https://www.sei.cmu.edu/library/deriving-candidate-technical-controls-and-indicators-of-insider-attack-from-socio-technical-models-and-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrating-the-master-of-software-assurance-reference-curriculum-into-the-model-curriculum-and-guidelines-for-graduate-degree-programs-in-information-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/trust-and-trusted-computing-platforms/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-analysis-of-technical-observations-in-insider-theft-of-intellectual-property-cases/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-acquisition-perspective-on-product-evaluation/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecting-service-oriented-systems-2/</loc><lastmod>2024-01-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/best-practices-for-artifact-versioning-in-service-oriented-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-resilience-management-model-rmm-v11-code-of-practice-crosswalk-commercial-version-11/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-preliminary-model-of-insider-theft-of-intellectual-property/</loc><lastmod>2024-02-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/interoperability-in-the-e-government-context/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-control-using-centralized-logging-to-detect-data-exfiltration-near-insider-termination/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-resilience-management-model-cert-rmm-v11-nist-special-publication-crosswalk-version-1/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-defined-processes-as-a-context-for-resilience-measures/</loc></url><url><loc>https://www.sei.cmu.edu/library/spotlight-on-malicious-insiders-and-organized-crime-activity/</loc></url><url><loc>https://www.sei.cmu.edu/library/risk-based-measurement-and-analysis-application-to-software-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/mission-risk-diagnostic-mrd-method-description/</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/principles-of-trust-for-embedded-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/report-from-the-first-cert-rmm-users-group-workshop-series/</loc></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/securing-internet-sessions-with-sorbet/</loc></url><url><loc>https://www.sei.cmu.edu/library/cots-in-the-real-world-a-case-study-in-risk-discovery-and-repair/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-dod-acquisition-environment-and-software-product-lines/</loc></url><url><loc>https://www.sei.cmu.edu/library/theory-and-practice-of-enterprise-javabean-portability/</loc></url><url><loc>https://www.sei.cmu.edu/library/custom-vs-off-the-shelf-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/into-the-black-box-a-case-study-in-obtaining-visibility-into-commercial-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/product-line-acquisition-in-the-dod-the-promise-the-challenges/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-evaluation-with-atam-in-the-dod-system-acquisition-context/</loc></url><url><loc>https://www.sei.cmu.edu/library/dod-legacy-system-migration-guidelines/</loc></url><url><loc>https://www.sei.cmu.edu/library/options-analysis-for-reengineering-oar-issues-and-conceptual-approach/</loc></url><url><loc>https://www.sei.cmu.edu/library/lessons-learned-applying-commercial-off-the-shelf-products-manufacturing-resource-planning-ii-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-role-of-standards-in-cloud-computing-interoperability/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cloud-computing-at-the-tactical-edge/</loc></url><url><loc>https://www.sei.cmu.edu/library/supporting-the-use-of-cert-secure-coding-standards-in-dod-acquisitions/</loc></url><url><loc>https://www.sei.cmu.edu/library/well-theres-your-problem-isolating-the-crash-inducing-bits-in-a-fuzzed-file/</loc></url><url><loc>https://www.sei.cmu.edu/library/probability-based-parameter-selection-for-black-box-fuzz-testing/</loc></url><url><loc>https://www.sei.cmu.edu/library/competency-lifecycle-roadmap-toward-performance-readiness/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/communication-among-incident-responders-a-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-control-understanding-data-loss-prevention-dlp-and-detection-by-correlating-events-from-multiple-sources/</loc></url><url><loc>https://www.sei.cmu.edu/library/analyzing-cases-of-resilience-success-and-failure-a-research-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/dod-information-assurance-and-agile-challenges-and-recommendations-gathered-through-interviews-with-agile-program-managers-and-dod-accreditation-reviewers/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-control-using-universal-serial-bus-usb-device-auditing-to-detect-possible-data-exfiltration-by-malicious-insiders/</loc></url><url><loc>https://www.sei.cmu.edu/library/detecting-and-preventing-data-exfiltration-through-encrypted-web-sessions-via-traffic-inspection/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-mal-a-malware-analysis-lexicon/</loc></url><url><loc>https://www.sei.cmu.edu/library/justification-of-a-pattern-for-detecting-intellectual-property-theft-by-departing-insiders/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-competency-model/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/spotlight-on-insider-theft-of-intellectual-property-inside-the-united-states-involving-foreign-governments-or-organizations-2013/</loc></url><url><loc>https://www.sei.cmu.edu/library/application-virtualization-as-a-strategy-for-cyber-foraging-in-resource-constrained-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/isolating-patterns-of-failure-in-department-of-defense-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-attributes-and-mitigation-strategies/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-roadmap-of-risk-diagnostic-methods-developing-an-integrated-view-of-risk-identification-and-analysis-techniques/</loc></url><url><loc>https://www.sei.cmu.edu/library/unintentional-insider-threats-a-foundational-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/best-practices-against-insider-threats-in-all-nations-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/parallel-worlds-agile-and-waterfall-differences-and-similarities/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-control-using-plagiarism-detection-algorithms-to-prevent-data-exfiltration-in-near-real-time/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-resilience-management-model-cert-rmm-v11-nist-special-publication-800-66-crosswalk/</loc></url><url><loc>https://www.sei.cmu.edu/library/advancing-cybersecurity-capability-measurement-using-the-cert-rmm-maturity-indicator-level-scale/</loc></url><url><loc>https://www.sei.cmu.edu/library/cloud-service-provider-methods-for-managing-insider-threats-analysis-phase-i/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-measurement-state-of-the-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-software-development-tools-and-practices-in-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/cloud-service-provider-methods-for-managing-insider-threats-analysis-phase-ii-expanded-analysis-and-recommendations/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-proven-method-for-identifying-security-gaps-in-international-postal-and-transportation-critical-infrastructure/</loc></url><url><loc>https://www.sei.cmu.edu/library/improving-the-security-and-resilience-of-us-postal-service-mail-products-and-services-using-the-cert-resilience-management-model/</loc></url><url><loc>https://www.sei.cmu.edu/library/unintentional-insider-threats-social-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-methods-and-request-for-change-rfc-observations-from-dod-acquisition-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-metrics-progress-monitoring-of-agile-contractors/</loc></url><url><loc>https://www.sei.cmu.edu/library/results-in-relating-quality-attributes-to-acquisition-strategies/</loc></url><url><loc>https://www.sei.cmu.edu/library/potential-use-of-agile-methods-in-selected-dod-acquisitions-requirements-development-and-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-evaluation-of-a-square-for-cots-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-taxonomy-of-operational-cyber-security-risks-version-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-introduction-to-the-mission-risk-diagnostic-for-incident-management-capabilities-mrd-imc/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-resilience-management-model-cert-rmm-v11-nist-special-publication-crosswalk-version-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/improving-the-automated-detection-and-analysis-of-secure-coding-violations/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-software-teams-how-they-engage-with-systems-engineering-on-dod-acquisition-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/evaluation-of-the-applicability-of-html5-for-mobile-applications-in-resource-constrained-edge-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-resilience-management-modelmail-specific-process-areas-mail-induction-version-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-resilience-management-modelmail-specific-process-areas-mail-revenue-assurance-version-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-resilience-management-modelmail-specific-process-areas-international-mail-transportation-version-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/unintentional-insider-threats-a-review-of-phishing-and-malware-incidents-by-economic-sector-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/performance-of-compiler-assisted-memory-safety-checking/</loc></url><url><loc>https://www.sei.cmu.edu/library/patterns-and-practices-for-future-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-methods-in-air-force-sustainment-status-and-outlook/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-method-for-aligning-acquisition-strategies-and-software-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-malware-analysis-to-tailor-square-for-mobile-platforms/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-the-security-engineering-risk-analysis-sera-framework/</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/pattern-based-design-of-insider-threat-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/predicting-software-assurance-using-quality-and-reliability-measures-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/measuring-what-matters-workshop-report/</loc><lastmod>2025-01-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-proven-method-for-meeting-export-control-objectives-in-postal-and-shipping-sectors/</loc></url><url><loc>https://www.sei.cmu.edu/library/defining-a-maturity-scale-for-governing-operational-resilience/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-driven-engineering-automatic-code-generation-and-beyond/</loc></url><url><loc>https://www.sei.cmu.edu/library/emerging-technology-domains-risk-survey/</loc></url><url><loc>https://www.sei.cmu.edu/library/contracting-for-agile-software-development-in-the-department-of-defense-an-introduction/</loc></url><url><loc>https://www.sei.cmu.edu/library/structuring-the-chief-information-security-officer-organization-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-the-goal-question-indicator-metric-gqim-method-to-perform-military-situational-analysis/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-quelce-method-using-change-drivers-to-estimate-program-costs/</loc></url><url><loc>https://www.sei.cmu.edu/library/creating-centralized-reporting-for-microsoft-host-protection-technologies-the-enhanced-mitigation-experience-toolkit-emet/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-mapping-of-the-federal-financial-institutions-examination-council-ffiec-cybersecurity-assessment-tool-cat-to-the-cyber-resilience-review-crr/</loc></url><url><loc>https://www.sei.cmu.edu/library/low-cost-technical-solutions-to-jump-start-an-insider-threat-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/scaling-agile-methods-for-department-of-defense-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/update-2016-considerations-for-using-agile-in-dod-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/prototype-software-assurance-framework-saf-introduction-and-overview/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/defining-a-progress-metric-for-cert-rmm-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-hybrid-threat-modeling-method/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-mapping-of-the-health-insurance-portability-and-accountability-act-hipaa-security-rule-to-the-cyber-resilience-review-crr/</loc></url><url><loc>https://www.sei.cmu.edu/library/exploring-the-use-of-metrics-for-software-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-targeted-improvement-plan-for-service-continuity/</loc></url><url><loc>https://www.sei.cmu.edu/library/advancing-risk-management-capability-using-the-octave-forte-process/</loc></url><url><loc>https://www.sei.cmu.edu/library/planning-and-design-considerations-for-data-centers/</loc></url><url><loc>https://www.sei.cmu.edu/library/acquisition-security-framework-asf-managing-systems-cybersecurity-risk/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-architecture-based-design-method/</loc></url><url><loc>https://www.sei.cmu.edu/library/fourth-product-line-practice-workshop-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/improving-the-acquisition-of-software-intensive-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/atam-method-for-architecture-evaluation/</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/analysis-of-lead-assessor-feedback-for-cba-ipi-assessments-conducted-july-1998-october-1999/</loc></url><url><loc>https://www.sei.cmu.edu/library/simplex-architecture-performance-and-cost/</loc></url><url><loc>https://www.sei.cmu.edu/library/volume-ii-technical-concepts-of-component-based-software-engineering-2nd-edition/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-activity-framework-for-cots-based-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/arc-v10-assessment-requirements-for-cmmi-version-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-evaluation-theory-perspective-of-the-architecture-tradeoff-analysis-method-atam/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/survivable-network-analysis-method/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-process-achievement-at-tinker-air-force-base/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-team-software-process-an-overview-and-preliminary-results-of-using-disciplined-practices/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-simulation-model-for-managing-survivability-of-networked-information-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-survivability-of-network-systems-an-empirical-analysis/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-personal-software-process-psp/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-team-software-process-tsp/</loc></url><url><loc>https://www.sei.cmu.edu/library/third-dod-product-line-practice-workshop-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/product-line-analysis-a-practical-introduction/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-framework-for-the-specification-of-acquisition-models/</loc></url><url><loc>https://www.sei.cmu.edu/library/achieving-usability-through-software-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/quality-attribute-workshops/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/maintaining-transactional-context-a-model-problem/</loc></url><url><loc>https://www.sei.cmu.edu/library/applicability-of-general-scenarios-to-the-architecture-tradeoff-analysis-method/</loc></url><url><loc>https://www.sei.cmu.edu/library/octave-criteria-version-20/</loc></url><url><loc>https://www.sei.cmu.edu/library/fourth-dod-product-line-practice-workshop-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-enterprise-information-system-data-architecture-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/perspectives-on-open-source-software/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/octave-catalog-of-practices-version-20/</loc></url><url><loc>https://www.sei.cmu.edu/library/analysis-of-cmm-based-appraisal-for-internal-process-improvement-cba-ipi-assessment-feedback/</loc></url><url><loc>https://www.sei.cmu.edu/library/testing-a-software-product-line/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/packaging-predictable-assembly-with-prediction-enabled-component-technology/</loc></url><url><loc>https://www.sei.cmu.edu/library/legacy-system-modernization-strategies/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-reconstruction-guidelines/</loc></url><url><loc>https://www.sei.cmu.edu/library/fifth-product-line-practice-workshop-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/foundations-for-survivable-system-development-service-traces-intrusion-traces-and-evaluation-models/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/control-channel-toolkit-a-software-product-line-case-study/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmm-based-appraisal-for-internal-process-improvement-cba-ipi-version-12-method-description/</loc></url><url><loc>https://www.sei.cmu.edu/library/appraisal-requirements-for-cmmi-version-11-arc-v11/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-economic-considerations-to-choose-among-architecture-design-alternatives/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/evolutionary-process-for-integrating-cots-based-systems-epic-building-fielding-and-supporting-commercial-off-the-shelf-cots-based-solutions/</loc></url><url><loc>https://www.sei.cmu.edu/library/guidelines-for-developing-a-product-line-production-plan/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-road-to-cmmi-results-of-the-first-technology-transition-workshop/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/relating-the-team-software-process-tsp-to-the-capability-maturity-model-for-software-sw-cmm/</loc></url><url><loc>https://www.sei.cmu.edu/library/evolutionary-process-for-integrating-cots-based-systems-epic-an-overview/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-acquisition-capability-maturity-model-sa-cmm-version-103/</loc></url><url><loc>https://www.sei.cmu.edu/library/quality-attribute-workshops-2nd-edition/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/discovery-colloquium-quality-software-development-internet-speed/</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/model-based-verification-an-engineering-practice/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-evms-with-cots-based-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-independent-research-and-development-projects/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-reconstruction-practice-needs-and-current-approaches/</loc></url><url><loc>https://www.sei.cmu.edu/library/illuminating-the-fundamental-contributors-to-software-architecture-quality/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/life-cycle-models-for-survivable-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/predictable-assembly-of-substation-automation-systems-an-experiment-report-second-edition/</loc></url><url><loc>https://www.sei.cmu.edu/library/rules-of-thumb-for-the-use-of-cots-products/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-reconstruction-guidelines-third-edition/</loc></url><url><loc>https://www.sei.cmu.edu/library/making-architecture-design-decisions-an-economic-approach/</loc></url><url><loc>https://www.sei.cmu.edu/library/trustworthy-refinement-through-intrusion-aware-design/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-internal-consistency-of-key-process-areas-in-the-capability-maturity-model-cmm-for-software-sw-cmm/</loc></url><url><loc>https://www.sei.cmu.edu/library/salion-inc-a-software-product-line-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-survivability-analysis-using-easel/</loc></url><url><loc>https://www.sei.cmu.edu/library/state-of-the-practice-of-computer-security-incident-response-teams-csirts/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/trustworthy-refinement-through-intrusion-aware-design-triad/</loc></url><url><loc>https://www.sei.cmu.edu/library/interactions-among-techniques-addressing-quality-attributes/</loc></url><url><loc>https://www.sei.cmu.edu/library/deriving-architectural-tactics-a-step-toward-methodical-architectural-design/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-evolution-of-product-line-assets/</loc></url><url><loc>https://www.sei.cmu.edu/library/sacam-the-software-architecture-comparison-analysis-method/</loc></url><url><loc>https://www.sei.cmu.edu/library/fifth-dod-product-line-practice-workshop-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/product-line-analysis-for-practitioners/</loc></url><url><loc>https://www.sei.cmu.edu/library/volume-iii-a-technology-for-predictable-assembly-from-certifiable-components/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-basis-for-an-assembly-process-for-cots-based-systems-apcs/</loc></url><url><loc>https://www.sei.cmu.edu/library/case-study-computer-supplier-evaluation-practices-of-the-parenteral-drug-association/</loc></url><url><loc>https://www.sei.cmu.edu/library/overcoming-barriers-to-technology-adoption-in-small-manufacturing-enterprises-smes/</loc></url><url><loc>https://www.sei.cmu.edu/library/advanced-engineering-environments-for-small-manufacturing-enterprises-volume-i/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-team-software-process-tsp-in-practice-a-summary-of-recent-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/integration-of-computer-aided-design-and-finite-element-analysis-tools-in-a-small-manufacturing-enterprise/</loc></url><url><loc>https://www.sei.cmu.edu/library/quality-attribute-workshops-qaws-third-edition/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-process-for-cots-software-product-evaluation/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-independent-research-and-development-projects-fy-2003/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-model-problem-approach-to-measurement-to-track-association/</loc></url><url><loc>https://www.sei.cmu.edu/library/preliminary-design-of-arche-a-software-architecture-design-assistant/</loc></url><url><loc>https://www.sei.cmu.edu/library/interpreting-capability-maturity-model-integration-cmmi-for-cots-based-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/identifying-commercial-off-the-shelf-cots-product-risks-the-cots-usage-risk-evaluation/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/case-study-irs-business-system-modernization-process-improvement/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/army-strategic-software-improvement-program-assip-survey-of-army-acquisition-managers/</loc></url><url><loc>https://www.sei.cmu.edu/library/systems-of-systems-interoperability/</loc></url><url><loc>https://www.sei.cmu.edu/library/working-with-small-manufacturing-enterprises-an-analysis-of-tide/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-integrated-approach-to-software-process-improvement-at-wipro-technologies-veloci-q/</loc></url><url><loc>https://www.sei.cmu.edu/library/advanced-engineering-environments-for-small-manufacturing-enterprises-volume-ii/</loc></url><url><loc>https://www.sei.cmu.edu/library/documenting-component-and-connector-views-with-uml-20/</loc></url><url><loc>https://www.sei.cmu.edu/library/current-perspectives-on-interoperability/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-critical-success-factor-method-establishing-a-foundation-for-enterprise-security-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrating-software-architecture-centric-methods-into-the-rational-unified-process/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-alternative-to-technology-readiness-levels-for-non-developmental-item-ndi-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/mapping-tsp-to-cmmi/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/defining-incident-management-processes-for-csirts-a-work-in-progress/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/discovering-architectures-from-running-systems-lessons-learned/</loc></url><url><loc>https://www.sei.cmu.edu/library/performance-property-theories-for-predictable-assembly-from-certifiable-components-pacc/</loc></url><url><loc>https://www.sei.cmu.edu/library/approaches-to-constructive-interoperability/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-study-illicit-cyber-activity-in-the-banking-and-finance-sector/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-product-line-adoption-roadmap/</loc></url><url><loc>https://www.sei.cmu.edu/library/rapid-integration-tools-for-rapid-application-development-a-case-study-on-legacy-integration/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-product-lines-experiences-from-the-seventh-dod-software-product-line-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-process-improvement-journey-ibm-australia-application-management-services/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-structured-intuitive-model-for-product-line-economics-simple/</loc></url><url><loc>https://www.sei.cmu.edu/library/including-interoperability-in-the-acquisition-process/</loc></url><url><loc>https://www.sei.cmu.edu/library/sat-based-predicate-abstraction-of-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/reasoning-frameworks/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/verification-of-evolving-software-via-component-substitutability-analysis/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/security-quality-requirements-engineering-technical-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/variability-in-software-product-lines/</loc></url><url><loc>https://www.sei.cmu.edu/library/quars-a-tool-for-analyzing-requirement/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-impact-of-function-extraction-technology-on-next-generation-software-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/designing-for-reuse-of-configurable-logic/</loc></url><url><loc>https://www.sei.cmu.edu/library/preparing-for-automated-derivation-of-products-in-a-software-product-line/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-us-armys-common-avionics-architecture-system-caas-product-line-a-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/results-of-sei-independent-research-and-development-projects-and-report-on-emerging-technologies-and-technology-trends-fy2005/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/categorizing-business-goals-for-software-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-product-lines-experience-from-the-eighth-dod-software-product-line-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/techniques-for-developing-an-acquisition-strategy-by-profiling-software-risks/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-emergent-perspective-on-interoperation-in-systems-of-systems/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/performance-results-of-cmmi-based-process-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/detecting-scans-at-the-isp-level/</loc></url><url><loc>https://www.sei.cmu.edu/library/specifications-for-managed-strings/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-state-of-software-measurement-practice-results-of-2006-survey/</loc></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-second-software-architecture-technology-user-network-saturn-workshop/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/appraisal-requirements-for-cmmi-version-12-arc-v12/</loc></url><url><loc>https://www.sei.cmu.edu/library/risk-themes-discovered-through-architecture-evaluations/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-comparison-of-requirements-specification-methods-from-a-software-architecture-perspective/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/systems-of-systems-scaling-up-the-development-process/</loc></url><url><loc>https://www.sei.cmu.edu/library/technology-foundations-for-computational-evaluation-of-software-security-attributes/</loc></url><url><loc>https://www.sei.cmu.edu/library/attribute-driven-design-add-version-20/</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/comparing-insider-it-sabotage-and-espionage-a-model-based-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/certified-binaries-for-software-components/</loc></url><url><loc>https://www.sei.cmu.edu/library/modifiability-tactics/</loc></url><url><loc>https://www.sei.cmu.edu/library/quality-attribute-based-economic-valuation-of-architectural-patterns/</loc></url><url><loc>https://www.sei.cmu.edu/library/understanding-and-leveraging-a-suppliers-cmmi-efforts-a-guidebook-for-acquirers/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-practical-example-of-applying-attribute-driven-design-add-version-20/</loc></url><url><loc>https://www.sei.cmu.edu/library/results-of-sei-independent-research-and-development-projects-fy-2006/</loc></url><url><loc>https://www.sei.cmu.edu/library/introducing-the-cert-resiliency-engineering-framework-improving-the-security-and-sustainability-processes/</loc></url><url><loc>https://www.sei.cmu.edu/library/progress-toward-an-organic-software-architecture-capability-in-the-us-army/</loc></url><url><loc>https://www.sei.cmu.edu/library/cots-and-reusable-software-management-planning-a-template-for-life-cycle-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/introducing-octave-allegro-improving-the-information-security-risk-assessment-process/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/case-study-accelerating-process-improvement-by-integrating-the-tsp-and-cmmi-2/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/developing-aadl-models-for-control-systems-a-practitioners-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/evaluating-a-service-oriented-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/scampi-lead-appraiser-body-of-knowledge-sla-bok/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/moving-up-the-cmmi-capability-and-maturity-levels-using-simulation/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-the-vickrey-clarke-groves-auction-mechanism-for-enhanced-bandwidth-allocation-in-tactical-data-networks/</loc></url><url><loc>https://www.sei.cmu.edu/library/mission-diagnostic-protocol-version-10-a-risk-based-approach-for-assessing-the-potential-for-success/</loc></url><url><loc>https://www.sei.cmu.edu/library/models-for-evaluating-and-improving-architecture-competence/</loc></url><url><loc>https://www.sei.cmu.edu/library/incident-management-mission-diagnostic-method-version-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/survivability-assurance-for-system-of-systems/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-big-picture-of-insider-it-sabotage-across-us-critical-infrastructures/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-data-specification-for-software-project-performance-measures-results-of-a-collaboration-on-performance-measurement/</loc></url><url><loc>https://www.sei.cmu.edu/library/evaluation-of-cert-secure-coding-rules-through-integration-with-source-code-analysis-tools/</loc><lastmod>2023-06-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/results-of-sei-independent-research-and-development-projects-fy-2007/</loc></url><url><loc>https://www.sei.cmu.edu/library/requirements-and-their-impact-downstream-improving-causal-analysis-processes-through-measurement-and-analysis-of-textual-information/</loc></url><url><loc>https://www.sei.cmu.edu/library/overview-of-the-lambda-performance-reasoning-frameworks/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/use-and-organizational-effects-of-measurement-and-analysis-in-high-maturity-organizations-results-from-the-2008-sei-state-of-measurement-and-analysis-practice-surveys/</loc></url><url><loc>https://www.sei.cmu.edu/library/results-of-sei-independent-research-and-development-projects-fy-2008/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/people-capability-maturity-model-p-cmm-version-20-second-edition/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/high-fidelity-e-learning-the-seis-virtual-training-environment-vte/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/realizing-and-refining-architectural-tactics-availability/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-framework-for-categorizing-key-drivers-of-risk/</loc></url><url><loc>https://www.sei.cmu.edu/library/us-army-workshop-on-exploring-enterprise-system-of-systems-system-and-software-architectures/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-design-patterns/</loc><lastmod>2023-06-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/deploying-tsp-on-a-national-scale-an-experience-report-from-pilot-projects-in-mexico/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-product-lines-report-of-the-2009-us-army-software-product-line-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/system-architecture-virtual-integration-an-industrial-case-study/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measurement-and-analysis-infrastructure-diagnostic-maid-evaluation-criteria-version-10/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/evaluating-the-software-design-of-a-complex-system-of-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/results-of-sei-independent-research-and-development-projects-fy-2009/</loc></url><url><loc>https://www.sei.cmu.edu/library/case-study-model-based-analysis-of-the-mission-data-system-reference-architecture/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-curriculum-project-volume-i-master-of-software-assurance-reference-curriculum/</loc></url><url><loc>https://www.sei.cmu.edu/library/program-executive-officer-aviation-major-milestone-reviews-lessons-learned-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/characterizing-technical-software-performance-within-system-of-systems-acquisitions-a-step-wise-methodology/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/extending-team-software-process-tsp-to-systems-engineering-a-navair-experience-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/smart-grid-maturity-model-version-11-model-definition/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/identifying-anomalous-port-specific-network-behavior/</loc></url><url><loc>https://www.sei.cmu.edu/library/testing-in-service-oriented-environments/</loc><lastmod>2025-08-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-resilience-management-model-version-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/reports-from-the-field-on-system-of-systems-interoperability-challenges-and-promising-approaches/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-product-lines-report-of-the-2010-us-army-software-product-line-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/java-concurrency-guidelines/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/success-in-acquisition-using-archetypes-to-beat-the-odds/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/risk-management-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/specifications-for-managed-strings-second-edition/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-curriculum-project-volume-ii-undergraduate-course-outlines/</loc></url><url><loc>https://www.sei.cmu.edu/library/team-software-process-tsp-body-of-knowledge-bok/</loc></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-for-energy-delivery-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/performance-effects-of-measurement-and-analysis-perspectives-from-cmmi-high-maturity-organizations-and-appraisers/</loc></url><url><loc>https://www.sei.cmu.edu/library/performance-analysis-of-ws-security-mechanisms-in-soap-based-web-services/</loc></url><url><loc>https://www.sei.cmu.edu/library/programmatic-and-constructive-interdependence-emerging-insights-and-predictive-indicators-of-development-resource-demand/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-assured-systems-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-framework-for-modeling-the-software-assurance-ecosystem-insights-from-the-software-assurance-landscape-project/</loc></url><url><loc>https://www.sei.cmu.edu/library/covert-a-framework-for-finding-buffer-overflows-in-c-programs-via-software-verification/</loc></url><url><loc>https://www.sei.cmu.edu/library/adaptive-flow-control-for-enabling-quality-of-service-in-tactical-ad-hoc-wireless-networks/</loc><lastmod>2024-01-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/combining-architecture-centric-engineering-with-the-team-software-process/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measurement-and-analysis-infrastructure-diagnostic-version-10-method-definition-document/</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/strategic-planning-with-critical-success-factors-and-future-scenarios-an-integrated-strategic-planning-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-tsp-data-to-evaluate-your-project-performance/</loc></url><url><loc>https://www.sei.cmu.edu/library/suggestions-for-documenting-soa-based-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/beyond-technology-readiness-levels-for-software-us-army-workshop-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-cert-approach-to-cybersecurity-workforce-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/results-of-sei-independent-research-and-development-projects-fy-2010/</loc><lastmod>2024-01-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/network-monitoring-for-web-based-threats/</loc></url><url><loc>https://www.sei.cmu.edu/library/appraisal-requirements-for-cmmi-version-13-arc-v13/</loc></url><url><loc>https://www.sei.cmu.edu/library/ieee-computer-societysoftware-engineering-institute-software-process-achievement-spa-award-2009/</loc></url><url><loc>https://www.sei.cmu.edu/library/function-extraction-fx-research-for-computation-of-software-behavior-2010-development-and-application-of-semantic-reduction-theorems-for-behavior-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-curriculum-project-volume-iii-master-of-software-assurance-course-syllabi/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-decision-framework-for-selecting-licensing-rights-for-noncommercial-computer-software-in-the-dod-environment/</loc><lastmod>2024-01-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/best-practices-for-national-cyber-security-building-a-national-computer-security-incident-management-capability-version-20/</loc><lastmod>2024-01-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-curriculum-project-volume-iv-community-college-education/</loc></url><url><loc>https://www.sei.cmu.edu/library/measures-for-managing-operational-resilience/</loc><lastmod>2024-01-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-resilience-management-model-capability-appraisal-method-cam-version-11/</loc></url><url><loc>https://www.sei.cmu.edu/library/understanding-and-leveraging-a-suppliers-cmmi-efforts-a-guidebook-for-acquirers-revised-for-v13/</loc></url><url><loc>https://www.sei.cmu.edu/library/smart-grid-maturity-model-version-12-model-definition/</loc></url><url><loc>https://www.sei.cmu.edu/library/quantifying-uncertainty-in-early-lifecycle-cost-estimation-quelce/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-investigation-of-techniques-for-detecting-data-anomalies-in-earned-value-management-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-evolution-of-a-science-project-a-preliminary-system-dynamics-model-of-a-recurring-software-reliant-acquisition-behavior/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-virtual-upgrade-validation-method-for-software-reliant-systems/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-security-reference-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-pattern-for-increased-monitoring-for-intellectual-property-theft-by-departing-insiders/</loc></url><url><loc>https://www.sei.cmu.edu/library/toward-a-reform-of-the-defense-department-software-acquisition-policy/</loc></url><url><loc>https://www.sei.cmu.edu/library/proposal-for-a-new-rights-in-software-clause-for-software-acquisitions-by-the-department-of-defense/</loc></url><url><loc>https://www.sei.cmu.edu/library/durra-a-task-level-description-language-preliminary-reference-manual/</loc></url><url><loc>https://www.sei.cmu.edu/library/specifying-functional-and-timing-behavior-for-real-time-applications/</loc></url><url><loc>https://www.sei.cmu.edu/library/summary-of-the-sei-workshop-on-software-configuration-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-heterogeneous-machine-simulator/</loc></url><url><loc>https://www.sei.cmu.edu/library/evaluation-of-ada-environments-executive-summary/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-effect-of-software-support-needs-on-dod-software-acquisition-policy-part-1-a-framework-for-analyzing-legal-issues/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-and-system-warranty-issues/</loc></url><url><loc>https://www.sei.cmu.edu/library/distributed-systems-technology-survey/</loc></url><url><loc>https://www.sei.cmu.edu/library/user-interface-technology-survey/</loc></url><url><loc>https://www.sei.cmu.edu/library/tool-interface-technology/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-engineering-education-an-interim-report-from-the-software-engineering-institute/</loc></url><url><loc>https://www.sei.cmu.edu/library/ada-adoption-handbook/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-guide-to-the-classification-and-assessment-of-software-engineering-tools/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-analysis-of-the-technical-order-production-process-at-ogden-air-logistics-center-and-recommendations-for-the-improvement-of-the-process/</loc></url><url><loc>https://www.sei.cmu.edu/library/seeking-the-balance-between-government-and-industry-interests-in-software-acquisition-volume-i-a-basis-for-reconciling-dod-and-industry-needs-for-rights-in-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-use-of-representation-clauses-and-implementation-dependent-features-in-ada-i-overview/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-use-of-representation-clauses-and-implementation-dependent-features-in-ada-iia-evaluation-questions/</loc></url><url><loc>https://www.sei.cmu.edu/library/preliminary-report-on-conducting-sei-assisted-assessments-of-software-engineering/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-use-of-representation-clauses-and-implementation-dependent-features-in-ada-iiia-qualitative-results-for-vax-ada/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-use-of-representation-clauses-and-implementation-dependent-features-in-ada-iib-experimental-procedures/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-use-of-representation-clauses-and-implementation-dependentfeatures-in-ada-iva-qualitative-results-for-adam44/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/teaching-a-project-intensive-introduction-to-software-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/timing-variation-in-dual-loop-benchmarks/</loc></url><url><loc>https://www.sei.cmu.edu/library/factors-causing-unexpected-variations-in-ada-benchmarks/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-method-for-assessing-the-software-engineering-capability-of-contractors/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-development/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/final-evaluation-of-mips-m500-final-report-for-the-risc-insertion-project/</loc></url><url><loc>https://www.sei.cmu.edu/library/ada-for-embedded-systems-issues-and-questions/</loc></url><url><loc>https://www.sei.cmu.edu/library/ada-performance-benchmarks-on-the-microvax-ii-summary-and-results-version-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-survey-of-real-time-performance-benchmarks-for-the-ada-programming-language/</loc></url><url><loc>https://www.sei.cmu.edu/library/vaxelyn-experimentation-programming-a-real-time-clock-and-interrupt-handling-using-vaxelyn-ada-11/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/criteria-for-constructing-and-using-an-ada-embedded-system-testbed/</loc></url><url><loc>https://www.sei.cmu.edu/library/annual-technical-report-for-ada-embedded-systems-testbed-project/</loc></url><url><loc>https://www.sei.cmu.edu/library/vaxeln-experimentation-programming-a-real-time-periodic-task-dispatcher-using-vaxeln-ada-11/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/inertial-navigation-system-simulator-behavioral-specification-1987/</loc></url><url><loc>https://www.sei.cmu.edu/library/inertial-navigation-system-simulator-program-top-level-design-1987/</loc></url><url><loc>https://www.sei.cmu.edu/library/prototype-real-time-monitor-executive-summary/</loc></url><url><loc>https://www.sei.cmu.edu/library/prototype-real-time-monitor-requirements/</loc></url><url><loc>https://www.sei.cmu.edu/library/prototype-real-time-monitor-users-manual/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/prototype-real-time-monitor-design/</loc></url><url><loc>https://www.sei.cmu.edu/library/prototype-real-time-monitor-ada-code/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-classification-scheme-for-software-development-methods/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/issues-in-software-a-blue-two-visit-feasibility-assessment/</loc></url><url><loc>https://www.sei.cmu.edu/library/report-on-the-sei-workshop-on-ada-in-freshman-courses/</loc></url><url><loc>https://www.sei.cmu.edu/library/views-for-evolution-in-programming-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/evolving-persistent-objects-in-a-distributed-environment/</loc></url><url><loc>https://www.sei.cmu.edu/library/idl-background-and-status/</loc></url><url><loc>https://www.sei.cmu.edu/library/interfacing-ada-and-sql/</loc></url><url><loc>https://www.sei.cmu.edu/library/mastertask-the-durra-task-emulator/</loc></url><url><loc>https://www.sei.cmu.edu/library/istar-evaluation/</loc></url><url><loc>https://www.sei.cmu.edu/library/evaluation-and-recommendations-for-technology-insertion-into-technical-order-maintenance/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-the-serpent-user-interface-management-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/serpent-runtime-architecture-and-dialogue-model/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-project-management-experiment/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-guide-to-the-assessment-of-software-development-methods/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-process-modeling/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-development-of-very-large-systems-implications-for-integrated-environment-architectures/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/phase-i-testbed-description-requirements-and-selection-guidelines/</loc></url><url><loc>https://www.sei.cmu.edu/library/evaluation-of-the-rational-environment/</loc></url><url><loc>https://www.sei.cmu.edu/library/kernel-facilities-definition/</loc></url><url><loc>https://www.sei.cmu.edu/library/distributed-ada-real-time-kernel/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-durra-runtime-environment/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/generalized-image-library-a-durra-application-example/</loc></url><url><loc>https://www.sei.cmu.edu/library/experiment-transcripts-for-the-evaluation-of-the-rational-environment/</loc></url><url><loc>https://www.sei.cmu.edu/library/perspective-on-software-reuse/</loc></url><url><loc>https://www.sei.cmu.edu/library/functional-performance-specification-for-an-inertial-navigation-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/system-specification-document-shipboard-inertial-navigation-system-simulator-and-external-computer/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/functional-performance-specification-for-an-external-computer-system-simulator/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-the-vienna-development-method-vdm-to-formalize-a-communication-protocol/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-ood-paradigm-for-flight-simulators-2nd-edition/</loc></url><url><loc>https://www.sei.cmu.edu/library/real-time-scheduling-theory-and-ada-1988/</loc></url><url><loc>https://www.sei.cmu.edu/library/mode-change-protocols-for-priority-driven-preemptive-scheduling/</loc></url><url><loc>https://www.sei.cmu.edu/library/experiment-planning-for-software-development-redevelopment-experiment/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-state-of-software-engineering-practice-a-preliminary-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-process-modeling-principles-of-entity-process-models/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-role-of-assessment-in-software-process-improvement/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/human-machine-interaction-considerations-for-interactive-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-object-oriented-solution-example-a-flight-simulator-electrical-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-workshop-on-executive-software-issues-august-2-3-and-november-18-1988/</loc></url><url><loc>https://www.sei.cmu.edu/library/conducting-sei-assisted-software-process-assessments/</loc></url><url><loc>https://www.sei.cmu.edu/library/performance-and-reliability-enhancement-of-the-durra-runtime-environment/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/command-control-communications-and-intelligence-node-a-durra-application-example/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-engineering-education-directory-1989/</loc></url><url><loc>https://www.sei.cmu.edu/library/scheduling-sporadic-and-aperiodic-events-in-a-hard-real-time-system/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ada-adoption-handbook-compiler-evaluation-and-selection-version-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/real-time-scheduling-theory-and-ada/</loc></url><url><loc>https://www.sei.cmu.edu/library/implementing-priority-inheritance-algorithms-in-an-ada-runtime-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/guidelines-for-the-use-of-the-same/</loc></url><url><loc>https://www.sei.cmu.edu/library/adoption-of-software-engineering-innovations-in-organizations/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-real-time-locking-protocol/</loc></url><url><loc>https://www.sei.cmu.edu/library/kernel-architecture-manual/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/version-description-and-installation-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-report-on-graduate-software-engineering-education-1989/</loc></url><url><loc>https://www.sei.cmu.edu/library/real-time-software-engineering-in-ada-observations-and-guidelines/</loc></url><url><loc>https://www.sei.cmu.edu/library/hartstone-synthetic-benchmark-requirements-for-hard-real-time-applications/</loc></url><url><loc>https://www.sei.cmu.edu/library/temporal-logic-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/classifying-software-design-methods/</loc></url><url><loc>https://www.sei.cmu.edu/library/case-planning-and-the-software-process/</loc></url><url><loc>https://www.sei.cmu.edu/library/understanding-the-adoption-of-ada-a-field-study-report/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/what-a-software-engineer-needs-to-know-i-program-vocabulary/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-durra-application-debuggermonitor/</loc></url><url><loc>https://www.sei.cmu.edu/library/durra-a-task-level-description-language-users-manual/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/durra-a-task-level-description-language-reference-manual-version-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/inertial-navigation-system-simulator-behavioral-specification-1989/</loc></url><url><loc>https://www.sei.cmu.edu/library/comparative-evaluations-of-four-specification-methods-for-real-time-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/inertial-navigation-system-simulator-program-top-level-design/</loc></url><url><loc>https://www.sei.cmu.edu/library/dark-porting-and-extension-guide-kernel-version-30/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-report-on-undergraduate-software-engineering-education-1990/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-engineering-education-directory/</loc></url><url><loc>https://www.sei.cmu.edu/library/survey-of-formal-specification-techniques-for-reactive-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/implementing-sporadic-servers-in-ada/</loc></url><url><loc>https://www.sei.cmu.edu/library/hartstone-benchmark-results-and-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/generic-avionics-software-specification/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/spectrum-of-functionality-in-configuration-management-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/national-software-capacity-near-term-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/case-tool-integration-and-standardization/</loc></url><url><loc>https://www.sei.cmu.edu/library/informatics-for-a-new-century-computing-education-for-1990s-and-beyond/</loc></url><url><loc>https://www.sei.cmu.edu/library/experiences-porting-the-distributed-ada-real-time-kernel/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/studying-software-architecture-through-design-spaces-and-rules/</loc><lastmod>2024-01-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-analysis-of-inputoutput-paradigms-for-real-time-systems/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/prospects-for-an-engineering-discipline-of-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/feature-oriented-domain-analysis-foda-feasibility-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-design-space-and-design-rules-for-user-interface-software-architecture/</loc><lastmod>2023-10-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/transaction-oriented-configuration-management-a-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-engineering-process-group-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/tool-version-management-technology-a-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-sql-ada-module-description-language-samedl-version-375/</loc></url><url><loc>https://www.sei.cmu.edu/library/starsusers-workshop-final-report-issues-for-discussion-groups/</loc></url><url><loc>https://www.sei.cmu.edu/library/formal-development-of-ada-programs-using-z-and-anna-a-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-report-on-graduate-software-engineering-education-1991/</loc></url><url><loc>https://www.sei.cmu.edu/library/rationale-for-sql-ada-module-description-language-samedl/</loc></url><url><loc>https://www.sei.cmu.edu/library/evaluation-of-process-modeling-improvements/</loc></url><url><loc>https://www.sei.cmu.edu/library/rate-monotonic-analysis-for-real-time-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/configuration-management-models-in-commercial-environment/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/issues-in-tool-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-engineering-education-directory-1991/</loc></url><url><loc>https://www.sei.cmu.edu/library/models-for-undergraduate-project-courses-in-software-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/tool-integration-and-environment-architectures/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/notes-on-applications-of-the-sql-ada-module-description-language-samedl/</loc></url><url><loc>https://www.sei.cmu.edu/library/case-studies-in-environment-integration/</loc></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-case-adoption-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/measurement-in-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/issues-in-real-time-data-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/durra-a-task-level-description-language-reference-manual-version-3/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-description-of-cluster-code-generated-by-the-durra-compiler/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/design-specifications-for-adaptive-real-time-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/durra-an-integrated-approach-to-software-specification-modeling-and-rapid-prototyping/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/building-distributed-ada-applications-from-specifications-and-functional-components/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-application-level-implementation-of-the-sporadic-server/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-comparison-of-us-and-japanese-software-process-maturity/</loc></url><url><loc>https://www.sei.cmu.edu/library/application-of-feature-oriented-domain-analysis-to-the-army-movement-control-domain-and-appendices-a-i/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-critical-review-of-the-current-state-of-ipse-technology/</loc></url><url><loc>https://www.sei.cmu.edu/library/requirements-engineering-and-analysis-workshop-proceedings/</loc></url><url><loc>https://www.sei.cmu.edu/library/understanding-integration-in-a-software-development-environment/</loc></url><url><loc>https://www.sei.cmu.edu/library/ada-validation-tests-for-rate-monotonic-scheduling-algorithm/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-analysis-technique-for-examining-integration-in-a-project-support-environment/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-process-development-and-enactment-concepts-and-definitions/</loc></url><url><loc>https://www.sei.cmu.edu/library/issues-and-techniques-of-case-integration-with-configuration/</loc></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-case-management-workshop/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-software-process-improvement/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-past-present-and-future-of-configuration-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/parallels-in-computer-aided-design-framework-and-software-development-environment-efforts/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/analysis-of-reservation-based-dual-link-networks/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-measurement-concepts-for-acquisition-program-managers/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-classification-and-bibliography-of-software-prototyping/</loc></url><url><loc>https://www.sei.cmu.edu/library/guide-to-case-adoption/</loc></url><url><loc>https://www.sei.cmu.edu/library/rationale-for-sql-ada-module-language-description-samedl/</loc></url><url><loc>https://www.sei.cmu.edu/library/experience-with-a-course-on-architectures-for-software-systems-part-i-course-description/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-measurement-for-dod-systems-recommendations-for-initial-core-measures/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-size-measurement-a-framework-for-counting-source-statements/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-effort-and-schedule-measurement-a-framework-for-counting-staff-hours-and-reporting-schedule-information/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-quality-measurement-a-framework-for-counting-problems-and-defects/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-concept-study-for-a-national-software-engineering-database/</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-analysis-of-sei-software-process-assessment-results-1987-1991/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-measures-and-the-capability-maturity-model/</loc></url><url><loc>https://www.sei.cmu.edu/library/ada-adoption-handbook-a-program-managers-guide-version-20/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-development-risk-opportunity-not-problem/</loc></url><url><loc>https://www.sei.cmu.edu/library/analysis-of-a-software-maintenance-system-a-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/performance-and-ada-style-for-the-anbsy-2-submarine-combat-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-conceptual-framework-for-system-fault-tolerance/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/academic-legitimacy-of-the-software-engineering-discipline/</loc></url><url><loc>https://www.sei.cmu.edu/library/control-integration-through-message-passing/</loc></url><url><loc>https://www.sei.cmu.edu/library/durra-a-task-description-language-users-manual-version-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-overview-of-pcte-a-basis-for-a-portable-common-tool-environment/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/distributed-real-time-system-design-theoretical-concepts-and-applications/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-architectures-for-shared-information-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/process-centered-development-environments-an-exploration-of-issues/</loc></url><url><loc>https://www.sei.cmu.edu/library/safety-critical-software-status-report-and-annotated-bibliography/</loc><lastmod>2024-01-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/taxonomy-based-risk-identification/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-sei-and-nawc-working-together-to-establish-a-software-measurement-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-study-in-software-maintenance/</loc></url><url><loc>https://www.sei.cmu.edu/library/concepts-on-measuring-the-benefits-of-software-process-improvement/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-use-of-asn1-and-xdr-for-data-representation-in-real-time-distributed-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrating-001-tool-support-into-the-feature-oriented-domain-analysis-methodology/</loc></url><url><loc>https://www.sei.cmu.edu/library/amore-the-advanced-multimedia-organizer-for-requirements-elicitation/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-product-liability/</loc></url><url><loc>https://www.sei.cmu.edu/library/structural-modeling-an-application-framework-and-development-process-for-flight-simulators/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-investigation-into-the-state-of-the-practice-of-case-tool-integration/</loc></url><url><loc>https://www.sei.cmu.edu/library/establishing-a-software-measurement-process/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-capability-evaluation-sce-version-15-method-description/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-capability-evaluation-sce-version-10-implementation-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-ada-binding-to-the-safenet-lightweight-application-services/</loc></url><url><loc>https://www.sei.cmu.edu/library/reference-model-for-project-support-environments-version-20/</loc></url><url><loc>https://www.sei.cmu.edu/library/capability-maturity-model-for-software-version-11/</loc></url><url><loc>https://www.sei.cmu.edu/library/key-practices-of-the-capability-maturity-model-version-11/</loc></url><url><loc>https://www.sei.cmu.edu/library/case-studies-of-software-process-improvement-methods/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-survey-of-commonly-applied-methods-for-software-process-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-acquisition-process-for-the-management-of-risks-of-cost-overrun-and-time-delay-associated-with-software-development/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/technology-transition-push-a-case-study-of-rate-monotonic-analysis-part-1/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/technology-transition-pull-a-case-study-of-rate-monotonic-analysis-part-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-conceptual-framework-for-software-technology-transition/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-taxonomy-of-coordination-mechanisms-used-in-real-time-software-based-on-domain-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/procedure-calls-are-the-assembly-language-of-software-interconnection-connectors-deserve-first-class-status/</loc></url><url><loc>https://www.sei.cmu.edu/library/exploring-hypermedia-information-services-for-disseminating-software-engineering-information/</loc></url><url><loc>https://www.sei.cmu.edu/library/interim-profile-development-and-trial-of-a-method-to-rapidly-measure-software-engineering-maturity-status/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-capability-evaluation-sce-version-20-implementation-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-capability-evaluation-version-20-method-description/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-practical-guide-to-the-technology-and-adoption-of-software-process-automation/</loc></url><url><loc>https://www.sei.cmu.edu/library/mapping-a-domain-model-and-architecture-to-a-generic-design/</loc></url><url><loc>https://www.sei.cmu.edu/library/artificial-intelligence-ai-and-ada-integrating-ai-with-mainstream-software-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/toward-deriving-software-architectures-from-quality-attributes/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-progress-report-on-undergraduate-software-engineering-education/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-comparison-of-iso-9001-and-the-capability-maturity-model-for-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/benefits-of-cmm-based-software-process-improvement-initial-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-construct-for-describing-software-development-risks/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/beyond-objects-a-software-design-paradigm-based-on-process-control/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-dod-software-measurement-pilot-applying-the-sei-core-measures/</loc></url><url><loc>https://www.sei.cmu.edu/library/replacing-the-message-service-component-in-an-integration-framework/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/spinning-a-web-publishing-the-sei-software-configuration-management-research-on-the-world-wide-web/</loc></url><url><loc>https://www.sei.cmu.edu/library/experience-with-a-course-on-architectures-for-software-systems-part-ii-educational-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-introduction-to-software-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-process-improvement-in-the-nasa-software-engineering-laboratory/</loc></url><url><loc>https://www.sei.cmu.edu/library/characteristics-of-higher-level-languages-for-software-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/process-tailoring-and-the-software-capability-maturity-model/</loc></url><url><loc>https://www.sei.cmu.edu/library/relationships-between-the-systems-engineering-capability-maturity-model-and-other-products-version-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmm-appraisal-framework-version-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/object-oriented-software-measures/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-subject-matter-of-process-improvement-a-topic-and-reference-source-for-software-engineering-educators-and-trainers/</loc></url><url><loc>https://www.sei.cmu.edu/library/report-on-distance-learning-technologies/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-software-architecture-for-dependable-and-evolvable-industrial-computing-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/training-guidelines-creating-a-training-plan-for-a-software-organization/</loc></url><url><loc>https://www.sei.cmu.edu/library/moving-on-up-data-and-experience-doing-cmm-based-process-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/after-the-appraisal-a-systematic-survey-of-process-improvement-its-benefits-and-factors-that-influence-success/</loc><lastmod>2025-05-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/training-guidelines-purchasing-training-for-a-software-organization/</loc></url><url><loc>https://www.sei.cmu.edu/library/distributed-system-design-using-generalized-rate-monotonic-theory/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-capability-evaluation-version-30-implementation-guide-for-supplier-selection/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-experiment-in-software-development-risk-information-analysis/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-unified-information-security-infosec-architecture-uia-gadfly-project/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-collaboration-in-implementing-team-risk-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/raytheon-electronic-systems-experience-in-software-process-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/fingertip-access-to-software-engineering-information-and-learning-sail-on-the-informedia-dvls/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-evolutionary-perspective-of-software-engineering-research-through-co-word-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/state-of-the-practice-report-problems-in-the-practice-of-performance-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/quality-attributes/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-capability-evaluation-version-30-method-description/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-an-executive-overview/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-mature-profession-of-software-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-architectural-description-of-the-simplex-architecture/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmm-based-appraisal-for-internal-process-improvement-cba-ipi-method-description/</loc></url><url><loc>https://www.sei.cmu.edu/library/coming-attractions-in-software-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/transitioning-domain-analysis-an-industry-experience/</loc></url><url><loc>https://www.sei.cmu.edu/library/investment-analysis-of-software-assets-for-product-lines/</loc></url><url><loc>https://www.sei.cmu.edu/library/issues-in-requirements-elicitation/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-process-automation-experiences-from-the-trenches/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-controlled-experiment-measuring-the-effect-of-procedure-argument-type-checking-on-programmer-productivity/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-case-study-in-successful-product-line-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/transitioning-a-model-based-software-engineering-architectural-style-to-ada-95/</loc></url><url><loc>https://www.sei.cmu.edu/library/concept-of-operations-for-escs-product-line-approach/</loc></url><url><loc>https://www.sei.cmu.edu/library/coming-attractions-in-program-understanding/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-acquisition-capability-maturity-model/</loc></url><url><loc>https://www.sei.cmu.edu/library/cleanroom-software-engineering-reference/</loc></url><url><loc>https://www.sei.cmu.edu/library/cleanroom-software-engineering-implementation-of-the-capability-maturity-model-cmm-for-software/</loc><lastmod>2023-11-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/radical-improvements-require-radical-actions-simulating-a-high-maturity-software-organization/</loc></url><url><loc>https://www.sei.cmu.edu/library/recommended-best-industrial-practice-for-software-architecture-evaluation/</loc></url><url><loc>https://www.sei.cmu.edu/library/best-training-practices-within-the-software-engineering-industry/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-case-study-in-structural-modeling/</loc></url><url><loc>https://www.sei.cmu.edu/library/principles-for-evaluating-the-quality-attributes-of-a-software-architecture/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-personal-software-process-psp-an-empirical-study-of-the-impact-of-psp-on-individual-engineers/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-year-2000-problem-issues-and-implications/</loc></url><url><loc>https://www.sei.cmu.edu/library/product-line-practice-workshop-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/distributed-object-technology-with-corba-and-java-key-concepts-and-implications/</loc></url><url><loc>https://www.sei.cmu.edu/library/implications-of-distributed-object-technology-for-reengineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/enterprise-framework-for-the-disciplined-evolution-of-legacy-systems/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-process-automation-interviews-survey-and-workshop-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-approach-for-selecting-and-specifying-tools-for-information-survivability/</loc></url><url><loc>https://www.sei.cmu.edu/library/playing-detective-reconstructing-software-architecture-from-available-evidence/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-study-in-the-use-of-corba-in-real-time-settings-model-problems-for-the-manufacturing-domain/</loc></url><url><loc>https://www.sei.cmu.edu/library/discovering-discover/</loc></url><url><loc>https://www.sei.cmu.edu/library/survivable-network-systems-an-emerging-discipline/</loc></url><url><loc>https://www.sei.cmu.edu/library/approaches-to-legacy-system-evolution/</loc></url><url><loc>https://www.sei.cmu.edu/library/steps-in-an-architecture-tradeoff-analysis-method-quality-attribute-models-and-analysis/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/coming-attractions-in-program-understanding-ii-highlights-of-1997-and-opportunities-in-1998/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-acquisition-improvement-framework-saif-definition/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/transition-packages-for-expediting-technology-adoption-the-prototype-requirements-management-transition-package/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-reverse-engineering-environment-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/continuously-improving-software-process/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dod-product-line-practice-workshop-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-architecture-tradeoff-analysis-method/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-based-verification-a-technology-for-dependable-upgrade/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/browsers-for-distributed-systems-universal-paradigm-or-sirens-song/</loc></url><url><loc>https://www.sei.cmu.edu/library/agora-a-search-engine-for-software-components/</loc></url><url><loc>https://www.sei.cmu.edu/library/people-cmm-based-assessment-method-description/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-study-of-practice-issues-in-model-based-verification-using-the-symbolic-model-verifier-smv/</loc></url><url><loc>https://www.sei.cmu.edu/library/case-study-in-survivable-network-system-analysis/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/second-product-line-practice-workshop-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/rlogin1-the-untold-story/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/building-blocks-for-achieving-quality-of-service-with-commercial-off-the-shelf-cots-middleware/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-acquisition-capability-maturity-model-sa-cmm-version-102/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/third-product-line-practice-workshop-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-software-engineering-body-of-knowledge-version-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-introduction-to-software-engineering-practices-using-model-based-verification/</loc></url><url><loc>https://www.sei.cmu.edu/library/lessons-learned-collaborating-on-a-process-for-spi-at-xerox/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-based-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/guidelines-for-developing-a-product-line-concept-of-operations/</loc></url><url><loc>https://www.sei.cmu.edu/library/rollout-and-installation-of-risk-management-at-the-imint-directorate-national-reconnaissance-office/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-reengineering-projects-fail/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-do-organizations-have-assessments-do-they-pay-off/</loc></url><url><loc>https://www.sei.cmu.edu/library/construction-and-deployment-scripts-for-cots-based-open-source-systems/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-tradeoff-analyses-of-c4isr-products/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/second-dod-product-line-practice-workshop-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/simplex-in-a-hostile-communications-environment-the-coordinated-prototype/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/operationally-critical-threat-asset-and-vulnerability-evaluation-octave-framework-version-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-engineering-method-for-safety-region-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/case-study-development-of-a-baseline-controller-for-automatic-landing-of-an-f-16-aircraft-using-linear-matrix-inequalities-lmis/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/information-assurance-curriculum-and-certification-state-of-the-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/attribute-based-architectural-styles/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-case-study-on-analytical-analysis-of-the-inverted-pendulum-real-time-control-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/builders-guide-for-waterbeans-components/</loc></url><url><loc>https://www.sei.cmu.edu/library/architectural-evaluation-of-collaborative-agent-based-systems/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-process-improvement-works-advanced-information-services-inc/</loc></url><url><loc>https://www.sei.cmu.edu/library/state-of-the-practice-of-intrusion-detection-technologies/</loc><lastmod>2023-11-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sre-method-description-version-20-sre-team-members-notebook-version-20/</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/guidelines-for-software-engineering-education-version-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/toward-a-theory-of-assurance-case-confidence/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/results-of-sei-line-funded-exploratory-new-starts-projects/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-profiling-using-flow/</loc></url><url><loc>https://www.sei.cmu.edu/library/resource-allocation-in-dynamic-environments/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/common-sense-guide-to-mitigating-insider-threats-fourth-edition/</loc></url><url><loc>https://www.sei.cmu.edu/library/quantifying-uncertainty-in-expert-judgment-initial-results/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-risk-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/psp-vdc-an-adaptation-of-the-psp-that-incorporates-verified-design-by-contract/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/results-of-sei-line-funded-exploratory-new-starts-projects-fy-2012/</loc></url><url><loc>https://www.sei.cmu.edu/library/ada-performance-benchmarks-on-the-motorola-mc68020-summary-and-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-software-technical-review-process/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/results-of-sei-independent-research-and-development-projects-and-report-on-emerging-technologies-and-technology-trends-fy-2004/</loc><lastmod>2024-01-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-the-mission-thread-workshop-2/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/passive-detection-of-misbehaving-name-servers/</loc></url><url><loc>https://www.sei.cmu.edu/library/mobile-scale-rules-and-analysis-for-secure-java-and-android-coding/</loc></url><url><loc>https://www.sei.cmu.edu/library/commercial-mobile-alert-service-cmas-alerting-pipeline-taxonomy/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/understanding-patterns-for-system-of-systems-integration-2/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/international-implementation-of-best-practices-for-mitigating-insider-threat-analyses-for-india-and-germany/</loc></url><url><loc>https://www.sei.cmu.edu/library/data-driven-software-assurance-a-research-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/investigating-advanced-persistent-threat-1-apt1/</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/job-analysis-results-for-malicious-code-reverse-engineers-a-case-study/</loc><lastmod>2023-11-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-systematic-approach-for-assessing-workforce-readiness/</loc></url><url><loc>https://www.sei.cmu.edu/library/smart-collection-and-storage-method-for-network-traffic-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/aadl-fault-modeling-and-analysis-within-an-arp4761-safety-assessment/</loc></url><url><loc>https://www.sei.cmu.edu/library/regional-use-of-social-networking-tools/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-dynamic-model-of-sustainment-investment/</loc></url><url><loc>https://www.sei.cmu.edu/library/eliminative-argumentation-a-basis-for-arguing-confidence-in-system-properties/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/making-didfail-succeed-enhancing-the-cert-static-taint-analyzer-for-android-app-sets/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/improving-quality-using-architecture-fault-analysis-with-confidence-arguments-2/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/state-of-practice-report-essential-technical-and-nontechnical-issues-related-to-designing-sos-platform-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/enabling-incremental-iterative-development-at-scale-quality-attribute-refinement-and-allocation-in-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/improving-federal-cybersecurity-governance-through-data-driven-decision-making-and-execution/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/evaluating-and-mitigating-the-impact-of-complexity-in-software-models/</loc></url><url><loc>https://www.sei.cmu.edu/library/extending-aadl-for-security-design-assurance-of-cyber-physical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-foraging-for-improving-survivability-of-mobile-systems-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/2016-emerging-technology-domains-risk-survey/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-unique-approach-to-threat-analysis-mapping-a-malware-centric-methodology/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-honeynets-and-the-diamond-model-for-ics-threat-analysis/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-insider-threat-indicator-ontology/</loc></url><url><loc>https://www.sei.cmu.edu/library/dmpl-programming-and-verifying-distributed-mixed-synchrony-and-mixed-critical-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-requirement-specification-language-for-aadl-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-fault-modeling-and-analysis-with-the-error-model-annex-version-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/segment-fixed-priority-scheduling-for-self-suspending-real-time-tasks/</loc></url><url><loc>https://www.sei.cmu.edu/library/definition-and-measurement-of-complexity-in-the-context-of-safety-assurance/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/common-sense-guide-to-mitigating-insider-threats-fifth-edition/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-led-safety-process/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-critical-role-of-positive-incentives-for-reducing-insider-threats/</loc></url><url><loc>https://www.sei.cmu.edu/library/ieee-computer-societysoftware-engineering-institute-watts-s-humphrey-software-process-achievement-spa-award-2016-nationwide/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ieee-computer-societysoftware-engineering-institute-watts-s-humphrey-software-process-achievement-award-2016-raytheon-integrated-defense-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/didfail-coverage-and-precision-enhancement/</loc></url><url><loc>https://www.sei.cmu.edu/library/department-of-defense-software-factbook/</loc></url><url><loc>https://www.sei.cmu.edu/library/r-eactr-a-framework-for-designing-realistic-cyber-warfare-exercises/</loc></url><url><loc>https://www.sei.cmu.edu/library/2017-emerging-technology-domains-risk-survey/</loc></url><url><loc>https://www.sei.cmu.edu/library/roi-analysis-of-the-system-architecture-virtual-integration-initiative/</loc></url><url><loc>https://www.sei.cmu.edu/library/composing-effective-software-security-assurance-workflows/</loc></url><url><loc>https://www.sei.cmu.edu/library/ghosts-in-the-machine-a-framework-for-cyber-warfare-exercise-npc-simulation/</loc></url><url><loc>https://www.sei.cmu.edu/library/incident-management-capability-assessment/</loc></url><url><loc>https://www.sei.cmu.edu/library/common-sense-guide-to-mitigating-insider-threats-sixth-edition/</loc></url><url><loc>https://www.sei.cmu.edu/library/integration-of-automated-static-analysis-alert-classification-and-prioritization-with-auditing-tools-special-focus-on-scale/</loc></url><url><loc>https://www.sei.cmu.edu/library/overview-of-risks-threats-and-vulnerabilities-faced-in-moving-to-the-cloud/</loc></url><url><loc>https://www.sei.cmu.edu/library/cloud-security-best-practices-derived-from-mission-thread-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/ieee-computer-societysoftware-engineering-institute-watts-s-humphrey-software-process-achievement-award-2018-us-army-combat-capabilities-development-command-armaments-center-fire-control-systems-and-technology-directorate/</loc></url><url><loc>https://www.sei.cmu.edu/library/machine-learning-in-cybersecurity-a-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrability/</loc></url><url><loc>https://www.sei.cmu.edu/library/guide-to-implementing-devsecops-for-a-system-of-systems-in-highly-regulated-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/maintainability/</loc></url><url><loc>https://www.sei.cmu.edu/library/loss-magnitude-estimation-in-support-of-business-impact-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/modeling-and-validating-security-and-confidentiality-in-system-architectures/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/foundation-of-cyber-ranges/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-sector-csirt-framework-developing-sector-based-incident-response-capabilities/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/accenture-an-automation-maturity-journey/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-machine-learning-to-increase-npc-fidelity/</loc></url><url><loc>https://www.sei.cmu.edu/library/robustness/</loc></url><url><loc>https://www.sei.cmu.edu/library/twinops-digital-twins-meets-devops/</loc></url><url><loc>https://www.sei.cmu.edu/library/extensibility/</loc></url><url><loc>https://www.sei.cmu.edu/library/experiences-with-deploying-mothra-in-amazon-web-services-aws/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/challenge-development-guidelines-for-cybersecurity-competitions/</loc></url><url><loc>https://www.sei.cmu.edu/library/hartstone-benchmark-users-guide-version-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/serpent-overview/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/serpent-system-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/serpent-saddle-users-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/serpent-dialogue-editor-users-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/serpent-slang-reference-manual/</loc></url><url><loc>https://www.sei.cmu.edu/library/serpent-c-application-developers-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/serpent-ada-application-developers-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/serpent-guide-to-adding-toolkits/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-process-improvement-roadmap/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-the-octave-approach/</loc></url><url><loc>https://www.sei.cmu.edu/library/octave-method-implementation-guide-version-20-volume-1-introduction/</loc></url><url><loc>https://www.sei.cmu.edu/library/octave-method-implementation-guide-version-20-volume-2-preliminary-activities/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-curriculum-master-bibliography-and-course-references/</loc></url><url><loc>https://www.sei.cmu.edu/library/task-1-checklist-install-and-use-an-anti-virus-program-the-durch-tests/</loc></url><url><loc>https://www.sei.cmu.edu/library/prototype-for-a-field-guide-for-improving-processes-in-small-settings/</loc></url><url><loc>https://www.sei.cmu.edu/library/dod-work-sponsor-user-guide/</loc><lastmod>2026-03-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-to-instantiate-scaife-api-calls-using-sei-scaife-code-the-scaife-api-swagger-editor-and-developing-your-tool-with-auto-generated-code/</loc></url><url><loc>https://www.sei.cmu.edu/library/professional-c-programming-livelessons-video-training-part-i-writing-robust-secure-reliable-code/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2015-welcome-talk/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-to-measure-economics-and-data-in-security-policy/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2015-close-out-talk/</loc></url><url><loc>https://www.sei.cmu.edu/library/global-situational-awareness-with-free-tools/</loc></url><url><loc>https://www.sei.cmu.edu/library/pittsburgh-cyburgh-pa-a-global-leader-in-cyber-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-engineeringintegrating-assurance-into-system-and-software-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-devops-for-better-software-build/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-cyber-security-engineering/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-defects-in-software/</loc><lastmod>2023-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-reducing-the-effects-of-malware/</loc><lastmod>2023-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-machine-learning/</loc><lastmod>2024-02-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-workplace-violenceit-sabotage/</loc><lastmod>2023-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-cyber-risk-game-3-envelopes/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-penetration-testing/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-secure-devops/</loc><lastmod>2023-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-cyber-workforce-development-research/</loc><lastmod>2023-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-wireless-simulationwelle-d/</loc><lastmod>2023-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-coordinated-vulnerability-disclosure/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-internet-protocol-version-6-ipv6/</loc><lastmod>2024-06-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-automating-workforce-evaluation/</loc><lastmod>2024-01-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-engaging-stakeholders-on-insider-threat/</loc><lastmod>2024-01-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-cert-resilience-management-model-rmm/</loc><lastmod>2024-01-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-cyber-and-kinetic-warfighter-training/</loc><lastmod>2024-01-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-computing-and-the-human-context/</loc><lastmod>2024-01-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-using-smart-service-level-agreements-slas/</loc><lastmod>2024-01-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-why-phishing-matters/</loc><lastmod>2024-01-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-seis-internet-in-a-box-spurs-realistic-training/</loc><lastmod>2024-01-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-mitigating-ransomware/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-are-you-vulnerable-to-insider-threats/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-managing-operational-risk/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-cmu-ciso-executive-certificate/</loc><lastmod>2024-07-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-secure-coding-certificates/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-penetration-testing-misconfigurations/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/trusting-machines/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-leapfwd-learning-experience-acceleration-platform/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/assuring-autonomous-software/</loc><lastmod>2024-07-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-tactical-cloudlets/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-defending-against-ddos-attacks/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-enhancing-malware-analysis-with-ai/</loc><lastmod>2024-08-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-insider-threats/</loc><lastmod>2024-07-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-automated-code-repair/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-enterprise-risk-management/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-wannacry-ransomware/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-adding-security-to-agiles-scrum/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-code-flaw-alert-classification/</loc><lastmod>2024-07-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-cyber-analytics/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-cyber-security-risk-oversight/</loc><lastmod>2024-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-securing-open-source-components/</loc><lastmod>2024-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-secure-coding-standards/</loc><lastmod>2024-03-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-software-defined-world/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-representing-your-technical-debt/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-cyber-risk-appetite/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-cyber-investigator-certificate-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-cadence-in-agile-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-predictable-scalable-artificial-intelligence/</loc><lastmod>2024-07-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-cybersecurity-in-the-defense-acquisition-system/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-automated-reverse-engineering-with-pharos/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-preventing-the-next-heartbleed/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-obsidian-a-safer-blockchain-language/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-safely-using-iot-at-the-edge/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-scale/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-improving-the-state-of-cyber-intelligence/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-why-use-dynamic-design-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-safety-critical-design-by-shopping/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-augmented-reality-to-see-real-opportunity/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-game-theory-to-improve-government-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-preparing-for-ipv6-enterprise-deployment/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-cybersecurity-engineering-and-software-assurance/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-interruption-costs/</loc><lastmod>2024-05-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-security-engineering-risk-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-addressing-architectural-security-throughout-devops/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-promise-of-quantum-computing/</loc><lastmod>2024-10-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/build-secure-applications-with-devsecops/</loc></url><url><loc>https://www.sei.cmu.edu/library/4-rfp-elements-to-include-for-contracting-for-agile-development/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/natural-forces/</loc></url><url><loc>https://www.sei.cmu.edu/library/sql-injection/</loc></url><url><loc>https://www.sei.cmu.edu/library/deep-learning-in-cybersecurity/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-complete-devops-pipeline-the-foundation-for-success/</loc></url><url><loc>https://www.sei.cmu.edu/library/influence-attacks-on-machine-learning/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cross-origin-resource-sharing-cors/</loc></url><url><loc>https://www.sei.cmu.edu/library/getting-your-agile-program-started/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/assuring-cyber-physical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-sei-a-dod-ffrdc/</loc></url><url><loc>https://www.sei.cmu.edu/library/infrastructure-as-code-sustaining-your-legacy-applications/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-is-cyber-hygiene/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/learning-by-observing-via-inverse-reinforcement-learning/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/natural-language-processing-for-cybersecurity/</loc></url><url><loc>https://www.sei.cmu.edu/library/whats-it-like-to-intern-at-the-sei/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/defending-your-computer-network-from-dns-hijacking/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-to-fit-the-internet-into-a-box/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/integrating-threat-modeling-with-the-sera-method/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-confidence-maps/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/whats-going-on-with-near-term-quantum-computing/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-to-build-a-computer-from-scratch/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-cant-all-contractors-do-agile-the-same-way/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-devops-metrics-visualizations/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-secure-devops-managing-your-foss-dependencies/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute-assessing-the-skills-of-cyber-operatives/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/privacy-risk-management-methodology/</loc><lastmod>2024-06-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/virtual-system-integration/</loc><lastmod>2024-01-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/research-to-operations-exercise-and-simulation-platforms/</loc></url><url><loc>https://www.sei.cmu.edu/library/faa-sponsored-research-on-complexity-and-safety/</loc></url><url><loc>https://www.sei.cmu.edu/library/causal-learning-discovery/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-program-repair/</loc><lastmod>2024-07-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-code-generation-for-future-compatible-high-performance-graph-libraries/</loc></url><url><loc>https://www.sei.cmu.edu/library/panel-session-rapid-velocity-software-development-for-mature-organizations/</loc><lastmod>2024-07-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/panel-session-applying-artificial-intelligence/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/it-can-be-done-growing-an-architects-community/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-architects-framework-for-navigating-complexity-2017/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/deep-learning-for-software-development/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/j%C3%B8rn-%C3%B8lmheim-discusses-saturn-2017/</loc><lastmod>2024-07-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/velocity-in-software-development-2017/</loc></url><url><loc>https://www.sei.cmu.edu/library/iot-workshop-for-kids-and-adults/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2016-welcome-and-opening-remarks/</loc><lastmod>2024-07-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/who-is-speaking-saturn-2016/</loc><lastmod>2024-03-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/training-at-saturn-2016/</loc><lastmod>2024-03-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2016-special-track-internet-of-things-iot/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/why-you-should-attend-saturn-2016/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2016-keynote-architecture-and-the-evolution-of-complex-systems/</loc><lastmod>2024-07-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/artificial-intelligence-and-machine-learning-hype-vs-reality/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2015-keynote-rethinking-architecture-in-the-context-of-devops-by-mark-schwartz/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2015-talk-applying-ontologies-to-software-architecture-by-ian-maung/</loc><lastmod>2024-07-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2015-microservices-trial/</loc></url><url><loc>https://www.sei.cmu.edu/library/michael-keeling-discusses-saturn-conference-highlights-for-2014/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2014-talk-mapreduce-over-a-petabyte-is-the-easy-part-some-important-big-data-practicalities/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2018-recap-and-thank-you/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/why-you-should-attend-flocon-2018/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-conference-testimonials/</loc><lastmod>2024-07-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/special-plans-for-the-saturn-2016-reception/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2018-why-you-should-attend/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2017-cyclops-disa/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2017-why-you-should-attend/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2015-interview-what-was-your-favorite-presentation-or-tutorial/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2015-interview-what-sets-flocon-apart-from-other-conferences-of-this-type/</loc><lastmod>2024-07-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2015-interview-what-was-your-biggest-takeaway/</loc><lastmod>2024-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2015-interview-what-did-you-learn-at-flocon-that-you-can-apply-to-your-job/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2017-napatech-talks-about-sponsoring-flocon/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/why-you-should-attend-flocon-2020/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-keynote-virtual-reality-for-football-concussion-education-by-ricardo-valerdi/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-panel-death-of-the-architect-by-paulo-merson-et-al/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-talk-software-architecture-as-systems-dissolve-by-eoin-woods/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-talk-finally-compare-todays-performance-to-yesterdays-by-erik-ostermueller/</loc><lastmod>2023-11-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-talk-reactive-ddd-modeling-uncertainty-by-invited-speaker-vaughn-vernon/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-talk-watson-cognitive-services-by-invited-speaker-aroop-pandya/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-talk-architecture-of-the-caruso-ecosystem-by-matthias-naab/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-talk-are-containers-the-new-golden-hammer-by-tracy-bannon-and-lori-olson/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-talk-being-agile-about-architecture-by-joseph-yoder/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-talk-implementing-secure-devops-assessments-for-hre-by-david-shepard-2/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-talk-growing-great-sw-designers-workshop-by-george-fairbanks-and-michael-keeling/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-slide-roulette/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-you-should-attend-saturn-2018/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-do-i-use-geo-location-within-analysis-pipeline/</loc></url><url><loc>https://www.sei.cmu.edu/library/rwsiteinfo-part-of-the-silk-analysis-tool-suite/</loc></url><url><loc>https://www.sei.cmu.edu/library/rwfileinfo-part-of-the-silk-analysis-tool-suite/</loc></url><url><loc>https://www.sei.cmu.edu/library/understanding-the-silk-repository/</loc><lastmod>2023-10-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/pretty-prining-in-silk/</loc><lastmod>2023-11-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-do-i-get-a-list-created-in-analysis-pipeline-to-where-i-need-it/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-do-i-trend-in-analysis-pipeline/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-do-i-create-multi-trigger-alerts-in-analysis-pipeline/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-to-install-netsa-tools-on-ubuntu/</loc></url><url><loc>https://www.sei.cmu.edu/library/r-eactr-a-framework-for-designing-realistic-cyber-warfare-exercises-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/moving-cloud-computing-to-the-tactical-edge/</loc><lastmod>2023-09-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/exploring-the-system-design-tradespace/</loc></url><url><loc>https://www.sei.cmu.edu/library/automating-repair-of-pervasive-software-flaws/</loc></url><url><loc>https://www.sei.cmu.edu/library/malfaces-automating-malware-triage/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-devops-gauntlt-nmap-demo/</loc><lastmod>2024-01-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-devops-gauntlt-garmr-demo/</loc><lastmod>2024-01-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-devops-vagrantchef-demo/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-demo-compile/</loc><lastmod>2024-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-demo-running-fortify/</loc><lastmod>2024-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-demo-coverity/</loc><lastmod>2024-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-demo-coverity-gui/</loc><lastmod>2024-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-demo-building-database/</loc><lastmod>2024-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-demo-database-trends/</loc><lastmod>2024-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-demo-webserver-setup/</loc><lastmod>2024-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-demo-web-ui-columns/</loc><lastmod>2024-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-demo-web-ui-heading/</loc><lastmod>2024-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-demo-web-ui-code/</loc><lastmod>2024-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-demo-audit-null-pointer-dereference/</loc><lastmod>2024-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-demo-audit-standard-library-errors/</loc><lastmod>2024-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-demo-audit-buffer-overflow/</loc><lastmod>2024-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-demo-audit-freed-memory/</loc><lastmod>2024-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-demo-audit-format-strings/</loc><lastmod>2024-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-demo-create-spreadsheets/</loc><lastmod>2024-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/1-alisa-background-and-overview/</loc></url><url><loc>https://www.sei.cmu.edu/library/2-alisa-notations/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/3-verifiable-system-requirements/</loc></url><url><loc>https://www.sei.cmu.edu/library/4-verification-and-assurance-plan-notation/</loc></url><url><loc>https://www.sei.cmu.edu/library/5-reusable-global-requirements/</loc></url><url><loc>https://www.sei.cmu.edu/library/6-multitier-demo/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/invited-researcher-dr-lujo-bauer-associate-professorcmu-institute-for-software-research/</loc></url><url><loc>https://www.sei.cmu.edu/library/symposium-keynote-speaker-ari-gesher-director-of-software-engineeringkairos-aerospace/</loc></url><url><loc>https://www.sei.cmu.edu/library/interview-of-the-expert-bob-rudis-chief-security-data-scientistrapid7/</loc></url><url><loc>https://www.sei.cmu.edu/library/afternoon-keynote-speaker-shawn-riley-chief-data-officer-and-cisodarklight-cybersecurity/</loc><lastmod>2024-07-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-data-science-in-cybersecurity-symposium-panel/</loc><lastmod>2024-01-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/privacy-in-the-era-of-big-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/finsim-intro/</loc></url><url><loc>https://www.sei.cmu.edu/library/scadasim-intro/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2019-talk-engineering-modern-ml-and-cloud-systems/</loc><lastmod>2024-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2019-panel-of-experts-new-challenges-for-software-architects-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2019-talk-self-driving-cars-and-ai-transforming-our-cities-and-our-lives/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/topomojo-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/vtunnel-video/</loc><lastmod>2024-02-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/welle-d-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/ghosts-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/topgen-and-greybox-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/cognitive-computing-new-ways-of-developing-software-for-a-new-era-of-computing-saturn-keynote/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-talk-an-awaiting-sev0-considerations-for-architects-by-j-paul-reed/</loc></url><url><loc>https://www.sei.cmu.edu/library/insights-to-the-software-solutions-conference-2015/</loc></url><url><loc>https://www.sei.cmu.edu/library/efficient-netflow-partitioning-via-minimum-cuts/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2017-talk-high-performance-multi-threaded-immutable-store-for-c/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-arent-dod-programs-using-static-analysis-as-commercial-firms-do/</loc><lastmod>2024-07-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/games-that-work/</loc></url><url><loc>https://www.sei.cmu.edu/library/machine-and-human-interaction-in-aircraft-risk-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/part-7-mmowgli-action-plans-for-automated-testing/</loc><lastmod>2024-02-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/simulating-malicious-insiders-in-real-host-monitored-background-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-you-should-attend-saturn-2019/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/aadl-resource-analysis-workflow/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/probabilistic-analysis-of-time-sensitive-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-chat-with-the-technical-chairs-how-tutorials-are-changing/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/can-automation-make-11-greater-than-2/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-chat-with-the-technical-chairs-some-details-about-the-conference-venue/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/part-1-the-importance-of-automated-testing-in-open-systems-architecture-initiatives/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-future-of-software-engineering-by-grady-booch/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-can-model-based-system-analysis-be-more-integrated-with-system-development/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/what-is-cyber-intelligence/</loc><lastmod>2024-07-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-affordance-visualization-in-augmented-reality-caviar/</loc></url><url><loc>https://www.sei.cmu.edu/library/real-time-mobile-applications-in-intermittently-connected-networks/</loc></url><url><loc>https://www.sei.cmu.edu/library/quantifying-uncertainty-in-early-lifecycle-cost-estimation-an-introduction/</loc></url><url><loc>https://www.sei.cmu.edu/library/smart-grid-maturity-model-sgmm/</loc></url><url><loc>https://www.sei.cmu.edu/library/going-beyond-methodology-to-maximize-performance/</loc><lastmod>2024-02-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-led-requirement-specification-demo/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-can-dod-find-the-right-things-in-its-massive-data-lakes/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/nasa-60th-anniversary-congratulations-from-the-sei/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-could-happen-if-dod-embraced-early-prototyping-of-software-components-and-systems/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-director-and-ceo-dr-paul-nielsen/</loc></url><url><loc>https://www.sei.cmu.edu/library/watts-s-humphrey-software-process-achievement-award-winner/</loc></url><url><loc>https://www.sei.cmu.edu/library/installation-of-the-sei-eraces-scade-plugin/</loc></url><url><loc>https://www.sei.cmu.edu/library/data-intensive-systems/</loc><lastmod>2024-01-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/investment-model-for-software-sustainment/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-would-convince-dod-program-managers-to-use-model-based-system-engineering/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/processor-throughput-analysis/</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/come-join-the-sei/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/memory-analysis/</loc><lastmod>2025-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/what-are-the-challenges-in-bringing-cloud-computing-to-edge-environments/</loc><lastmod>2023-09-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/should-a-software-architect-be-concerned-with-risk-analysis/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/part-3-overview-of-the-navys-business-innovation-initiative/</loc><lastmod>2024-02-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-science-technology-engineering-math-stem-initiative/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/smart-grid-maturity-model-sgmm-overview/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-can-autonomy-reduce-clutter-in-battlefield-settings/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/what-does-a-software-architect-do/</loc><lastmod>2024-07-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/value-driven-incremental-development-vdid/</loc></url><url><loc>https://www.sei.cmu.edu/library/illicit-cyber-activity/</loc></url><url><loc>https://www.sei.cmu.edu/library/malware-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/schedulability-analysis/</loc><lastmod>2024-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-chat-with-the-technical-chairs-software-architecture-boot-camp/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/bandwidth-analysis/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-expert-performance-and-measurement/</loc></url><url><loc>https://www.sei.cmu.edu/library/deep-focus-increasing-user-depth-of-field-to-improve-threat-detection-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-chat-with-the-technical-chairs-the-different-types-and-times-of-sessions/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/part-6-avoiding-common-traps-and-pitfalls-of-cost-containment-via-automated-testing/</loc><lastmod>2024-02-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-chat-with-the-technical-chairs-an-introduction-to-saturn-2015/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/part-2-overview-of-the-navys-open-systems-architecture-initiatives/</loc><lastmod>2024-02-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-is-virtual-system-integration-useful/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/why-your-organization-should-sponsor-flocon-2020/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/what-does-hello-world-look-like-for-a-weapon-system/</loc><lastmod>2024-07-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/what-can-dod-cybersecurity-data-analysis-gain-from-biomedical-research/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-do-you-integrate-software-architecture-into-agiledevops-environments/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-chat-with-the-technical-chairs-new-ways-to-interact-with-speakers/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-demo-format-strings/</loc></url><url><loc>https://www.sei.cmu.edu/library/do-all-systems-have-technical-debt/</loc><lastmod>2024-07-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-is-dod-missing-opportunities-in-data-science/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-cyber-readiness-evaluator-ace/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-chat-with-the-technical-chairs-proximity-and-cross-pollination/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/hamr-high-assurance-modeling-and-rapid-engineering-for-embedded-systems-using-aadl/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-can-dod-make-more-effective-use-of-the-tremendous-amounts-of-data-its-sensors-produce/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/behavior-based-analysis-and-detection-of-mobile-devices/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/module-4-creating-distributed-algorithms/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-can-machine-learning-help-the-dod-with-binary-code-analysis/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-and-design-of-service-oriented-systems/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-dynamics/</loc><lastmod>2025-06-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/elicitation-of-unstated-requirements-at-scale-eurs/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/where-dynamic-and-static-code-analysis-merge/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-model-checking-for-verifying-distributed-algorithms/</loc></url><url><loc>https://www.sei.cmu.edu/library/fall-2014-sei-research-review-quantifying-uncertainty-in-early-lifecycle-cost-estimation-quelce/</loc></url><url><loc>https://www.sei.cmu.edu/library/fall-2014-sei-research-review-graph-algorithms-on-future-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/living-off-the-land-native-windows-tools-for-blue-team-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-can-automated-code-repair-help-dod-with-legacy-code-vulnerability-analysis/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/game-theory-calculations/</loc></url><url><loc>https://www.sei.cmu.edu/library/verifying-evolving-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/part-8-a-way-forward-for-automated-testing-in-open-systems-architecture-initiatives/</loc><lastmod>2024-02-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/use-of-the-sei-eraces-scade-plugin/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-are-the-roles-in-data-science/</loc><lastmod>2024-07-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mils-security-analysis-tool-for-aadl/</loc><lastmod>2024-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/agile-adoption-in-the-department-of-defense-dod/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-does-dod-struggle-in-using-machine-learning-to-automate-decision-making/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/what-would-the-warfighter-in-the-field-gain-from-commercial-software-innovations/</loc><lastmod>2024-07-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/contract-based-virtual-integration-and-cps-analyses/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-agile-research-forum/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/part-4-overview-of-the-massive-multiplayer-online-wargame-leveraging-the-internet-mmowgli/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-has-the-darpa-hacms-project-used-virtual-system-integration-technology/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/profiling-tracking-and-monetizing-analysis-of-internet-online-social-network-concerns/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-insider-threat-center-certificate-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-can-information-extraction-techniques-aid-dod-cybersecurity-efforts/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/high-confidence-cyber-physical-systems-hccps/</loc></url><url><loc>https://www.sei.cmu.edu/library/part-5-results-from-the-second-mmowgli-on-the-navys-business-innovation-initiative/</loc><lastmod>2024-02-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/malware-distribution-networks/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-chat-with-the-technical-chairs-the-process-for-submitting-presentations/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2014-tsp-symposium-co-chair-alan-willett-discusses-this-years-event/</loc></url><url><loc>https://www.sei.cmu.edu/library/fall-2014-sei-research-review-edge-enabled-tactical-systems-eets/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2019-modernizing-legacy-systems-to-virtual-cloud-based-software-defined-infrastructures/</loc></url><url><loc>https://www.sei.cmu.edu/library/aadl-code-generation-for-arinc653/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/fall-2014-sei-research-review-secure-coding/</loc></url><url><loc>https://www.sei.cmu.edu/library/scaife-an-alert-auditing-classification-prototype/</loc></url><url><loc>https://www.sei.cmu.edu/library/automating-alert-handling-reduces-manual-effort/</loc></url><url><loc>https://www.sei.cmu.edu/library/deepfakeswhat-can-really-be-done-today/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-is-ransomware/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-pitfall-in-acquisition-the-bottom-of-the-v/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-new-path-to-verifiable-confidence/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-all-processor-cores-while-being-confident-about-timing-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/rapid-certifiable-trust-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/untangling-the-knot-recommending-component-refactorings-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/causal-models-for-software-cost-prediction-and-control-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/rapid-construction-of-accurate-automatic-alert-handling-system-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/kalki-high-assurance-software-defined-iot-security-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-code-repair-to-ensure-memory-safety-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-series-of-unlikely-events-learning-patterns-by-observing-sequential-behavior-video/</loc><lastmod>2024-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/field-stripping-a-weapons-system-building-a-trustworthy-computer-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/recovering-meaningful-variable-names-in-decompiled-code-video/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/spiralaiml-resource-constrained-co-optimization-for-high-performance-data-intensive-computing/</loc></url><url><loc>https://www.sei.cmu.edu/library/projecting-quantum-computational-advantage-versus-classical-state-of-the-art-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/panel-supercharging-the-software-factory-deploying-capability-at-the-speed-of-relevance/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/causal-models-for-software-cost-prediction-control-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/graph-convolutional-neural-networks-2/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/integrating-safety-and-security-engineering-for-mission-critical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/summarizing-and-searching-video-2019/</loc></url><url><loc>https://www.sei.cmu.edu/library/future-reach-conversation-countering-adversarial-operations-made-possible-by-ai/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-artificial-intelligence-engineering-roadmap/</loc></url><url><loc>https://www.sei.cmu.edu/library/humanmachine-teaming-and-ai/</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/perspectives-on-quantum-computing-education-applications-and-the-future-of-the-field/</loc></url><url><loc>https://www.sei.cmu.edu/library/emotion-recognition-from-voice-in-the-wild-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/projecting-how-aiml-will-revolutionize-software-vulnerability-discovery/</loc></url><url><loc>https://www.sei.cmu.edu/library/defining-ai-engineering/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-a-mature-discipline/</loc></url><url><loc>https://www.sei.cmu.edu/library/protecting-systems-using-ssh-keys/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/bayes-at-10-gbps-identifying-malicious-and-vulnerable-processes-from-passive-traffic-fingerprinting/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/data-driven-security-challenges/</loc><lastmod>2024-05-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sysflow-scalable-system-telemetry-for-improved-security-analytics/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/quantum-computing-intern-update/</loc></url><url><loc>https://www.sei.cmu.edu/library/watts-s-humphrey-software-process-achievement-award/</loc></url><url><loc>https://www.sei.cmu.edu/library/user-logins-on-the-modern-web/</loc></url><url><loc>https://www.sei.cmu.edu/library/intersect-cybersecurity-maturity-model-certification-role-of-the-cybersecurity-engineer-10-cmmc-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-is-the-first-step-to-take-with-cyber-hygiene/</loc></url><url><loc>https://www.sei.cmu.edu/library/intersect-devops-engineer/</loc></url><url><loc>https://www.sei.cmu.edu/library/2019-presidents-cup-cybersecurity-competition/</loc></url><url><loc>https://www.sei.cmu.edu/library/machine-learning-researcher/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-role-of-the-penetration-tester/</loc></url><url><loc>https://www.sei.cmu.edu/library/use-of-acvip-containment-of-the-accumulation-of-program-technical-debt-using-aadl/</loc><lastmod>2023-12-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ellidiss-aadl-tools/</loc><lastmod>2024-01-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/high-assurance-modeling-and-rapid-engineering-hamr-for-embedded-systems/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-driven-assurance/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/aadl-for-dod-systems/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/welcome-to-aadl-user-day/</loc><lastmod>2024-07-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/telecom-paris-aadl-tools-portfolio-for-real-time-systems-virtual-integration/</loc><lastmod>2024-06-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/formal-behavior-verification-made-for-engineers/</loc><lastmod>2023-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/applying-aadl-with-the-edict-tool-suite/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/avionics-compositional-system-of-systems-simulation-and-modeling-tool-chain-assist/</loc></url><url><loc>https://www.sei.cmu.edu/library/aadl-is-an-integration-focal-point/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/pioneering-disruptive-real-time-softwaresystem-engineering-capability-for-army-aviation/</loc><lastmod>2024-07-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-open-source-aadl-tool/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-can-culture-help-the-dod-enable-devsecops/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-a-computer-can-learn-meaning-in-code-2019/</loc></url><url><loc>https://www.sei.cmu.edu/library/first-steps-to-implement-devsecops-in-a-dod-program/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cloud-security-safety-in-my-organization-2019/</loc></url><url><loc>https://www.sei.cmu.edu/library/beginning-your-cloud-architecture/</loc><lastmod>2024-04-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/are-open-source-and-devsecops-a-match-for-the-dod/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-workforce-development-and-the-cybersecurity-engineer/</loc></url><url><loc>https://www.sei.cmu.edu/library/train-but-verify-towards-practical-ai-robustness/</loc></url><url><loc>https://www.sei.cmu.edu/library/investigating-techniques-for-summarizing-and-searching-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/ethics-in-ai-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/knowing-when-you-dont-know-engineering-ai-systems-in-an-uncertain-world/</loc></url><url><loc>https://www.sei.cmu.edu/library/topics-in-advanced-computing-the-promise-and-challenges-of-recommendation-systems-for-the-dod/</loc></url><url><loc>https://www.sei.cmu.edu/library/advancing-cyber-operator-tradecraft-through-automated-static-binary-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-code-repair-for-memory-safety/</loc><lastmod>2024-02-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/static-code-analysis-classification/</loc></url><url><loc>https://www.sei.cmu.edu/library/implementing-cyber-security-in-dod-supply-chains/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/toward-the-use-of-human-machine-teaming-and-fully-autonomous-operations/</loc></url><url><loc>https://www.sei.cmu.edu/library/aide-artificial-intelligence-defense-evaluation/</loc></url><url><loc>https://www.sei.cmu.edu/library/about-the-presidents-cup-competition/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/untangling-the-knot-enabling-rapid-software-evolution-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/twinops-digital-twins-meet-devops/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-based-engineering-with-aadl-transitioning-research-to-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-research-in-action-multidisciplinary-work-supporting-a-paradigm-shift-in-dod-acquisition/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-design-conformance-during-continuous-integration/</loc></url><url><loc>https://www.sei.cmu.edu/library/modernization-for-rapid-delivery-of-enhanced-capabilityreduction-of-sustainment-cost/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-agile-virtual-schoolhouse/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-engineerings-grand-challenges-voices-from-visionaries/</loc></url><url><loc>https://www.sei.cmu.edu/library/rapid-adjudication-of-static-analysis-alerts-during-continuous-integration/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-product-lines-module-1-course-introduction/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/pathways-to-careers-in-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-value-engineering-to-propel-cyber-physical-systems-acquisition-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2021-keynote-address-using-data-to-defend/</loc><lastmod>2024-06-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-cyber-insurance-companies-determine-cyber-risk/</loc></url><url><loc>https://www.sei.cmu.edu/library/real-time-data-driven-risk-management/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/test-suites-as-a-source-of-training-data-for-static-analysis-classifiers/</loc><lastmod>2025-08-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acvip-perspective-on-aadl/</loc></url><url><loc>https://www.sei.cmu.edu/library/microservice-aware-reference-monitoring-through-hybrid-program-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/microservice-aware-reference-monitoring-through-hybrid-program-analysis-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2021-keynote-address-data-inspired-doing/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/traffic-analysis-for-website-prediction/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/applying-text-analytics-to-insider-threat-detection/</loc></url><url><loc>https://www.sei.cmu.edu/library/characterizing-packet-linearity/</loc></url><url><loc>https://www.sei.cmu.edu/library/improving-cyber-security-operations-through-security-data-discipline/</loc></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-data-science-csds-emerging-trends/</loc></url><url><loc>https://www.sei.cmu.edu/library/collecting-wire-data-at-household-speeds/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-data-science-concepts-techniques/</loc></url><url><loc>https://www.sei.cmu.edu/library/intrusion-analysis-and-threat-hunting-with-open-source-tools/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-research-review-2021-the-collaboration-effect/</loc><lastmod>2024-06-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/rapid-certifiable-trust-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/predicting-inference-degradation-in-production-ml-systems/</loc><lastmod>2024-02-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/towards-incremental-and-compositionally-verifiable-security-for-chic-centric-cyber-physical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/knowing-when-you-dont-know/</loc></url><url><loc>https://www.sei.cmu.edu/library/combined-analysis-for-source-code-and-binary-code-for-software-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/quantum-advantage-evaluation-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/train-but-verify-towards-practical-ai-robustness-2/</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/multicore-confidence/</loc></url><url><loc>https://www.sei.cmu.edu/library/rapid-adjudication-of-static-analysis-alerts-during-continuous-integration-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/untangling-the-knot-automating-software-isolation/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-design-conformance-during-continuous-integration-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/spiralaiml-resource-constrained-co-optimization-for-high-performance-data-intensive-computing-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/readme-a-learned-approach-to-augmenting-software-documentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/collaboration-conversation-on-scalable-assurance-of-safety-critical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2021-welcome-and-keynote-address-with-heidi-shyu/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2021-day-1-video/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2021-day-2-video/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2021-day-3-video/</loc><lastmod>2024-01-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/quantifying-the-impact-of-encrypted-dns-for-network-defenders/</loc></url><url><loc>https://www.sei.cmu.edu/library/improving-cyber-resiliency-through-microsegmentation-policy-optimization/</loc></url><url><loc>https://www.sei.cmu.edu/library/engineering-tactical-and-ai-enabled-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/ml-driven-new-account-fraud-early-detection-system/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/traditional-and-advanced-techniques-for-network-beacon-detection/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-do-we-mean-by-a-science-of-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/generating-known-unknowns-through-known-knowns/</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/above-our-heads-how-attackers-are-leveraging-the-cloud/</loc><lastmod>2025-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/self-modulating-endpoint-observability/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sensing-in-hybrid-clouds/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/teaming-data-science-and-causal-inference/</loc></url><url><loc>https://www.sei.cmu.edu/library/ai-at-the-sei/</loc></url><url><loc>https://www.sei.cmu.edu/library/where-software-architects-make-a-difference/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-cyber-risks-express-control-impact-and-risk-analysis-eci-ra/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/collaborative-botnet-detection-through-large-scale-network-traffic/</loc></url><url><loc>https://www.sei.cmu.edu/library/keynote-nids-is-dead-long-live-nids/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/keynote-journey-to-protecting-data-information-networks/</loc></url><url><loc>https://www.sei.cmu.edu/library/research-services-high-tea-2022/</loc></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-assurance-leader/</loc></url><url><loc>https://www.sei.cmu.edu/library/cimcor-materials-for-the-2022-zero-trust-industry-day/</loc></url><url><loc>https://www.sei.cmu.edu/library/iboss-materials-for-the-2022-zero-trust-industry-day/</loc></url><url><loc>https://www.sei.cmu.edu/library/banyan-security-materials-for-the-2022-zero-trust-industry-day/</loc></url><url><loc>https://www.sei.cmu.edu/library/ericom-materials-for-the-2022-zero-trust-industry-day/</loc></url><url><loc>https://www.sei.cmu.edu/library/greg-touhills-keynote-address-for-the-2022-zero-trust-industry-day/</loc></url><url><loc>https://www.sei.cmu.edu/library/panel-discussion-2022-zero-trust-industry-day/</loc><lastmod>2024-07-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-research-review-2022-overview-forging-the-path/</loc></url><url><loc>https://www.sei.cmu.edu/library/preview-of-knowing-when-you-dont-know-quantifying-and-reasoning-about-uncertainty-in-machine-learning-models/</loc></url><url><loc>https://www.sei.cmu.edu/library/preview-of-phite-portable-high-performance-inference-at-the-tactical-edge/</loc></url><url><loc>https://www.sei.cmu.edu/library/preview-of-automating-mismatch-detection-and-testing-in-ml-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/preview-of-a-machine-learning-pipeline-for-deepfake-detection/</loc></url><url><loc>https://www.sei.cmu.edu/library/preview-of-ai-evaluation-methodology-for-defensive-cyber-operator-tools/</loc></url><url><loc>https://www.sei.cmu.edu/library/preview-of-transformative-gamification-making-impact-across-the-federal-workforce/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/preview-of-chain-games-powering-autonomous-threat-hunting/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/preview-of-maturing-assurance-contracts-in-model-based-engineering/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/preview-of-addressing-devsecops-challenges-using-model-based-systems-engineering/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/preview-of-safety-analysis-and-fault-detection-isolation-and-recovery-synthesis-for-time-sensitive-cyber-physical-systems/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/preview-of-refactoring-for-software-isolation/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/preview-of-automated-design-conformance-during-continuous-integration/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/preview-of-acepops-program-information-at-the-speed-of-relevance/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/preview-of-advancing-algorithms-for-file-deduplication-across-containers/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/preview-of-semantic-equivalence-checking-of-decompiled-binaries/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/preview-of-developing-the-acquisition-security-framework-asf-towards-integrating-supply-chain-risk-management-into-the-program-acquisition-and-engineering-lifecycles/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/overview-of-juneberry/</loc></url><url><loc>https://www.sei.cmu.edu/library/overview-of-maturation-of-determining-the-limits-of-ai-robustness-mdlar/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2022-day-1-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2022-day-2-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2022-day-3-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-case-study-in-assessing-the-maintainability-of-large-software-intensive-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-gadfly-an-approach-to-architectural-level-system-comprehension/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insider-fraud-in-financial-services/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/approaches-for-edge-enabled-tactical-systems/</loc><lastmod>2024-06-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/keeping-your-family-safe-in-a-highly-connected-world/</loc></url><url><loc>https://www.sei.cmu.edu/library/deriving-software-security-measures-from-information-security-standards-of-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-for-system-of-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-technical-debt-in-software-reliant-systems-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/employing-soa-to-achieve-information-dominance/</loc><lastmod>2025-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architectures-for-the-cloud-best-practices-for-navy-adoption-of-cloud-computing/</loc></url><url><loc>https://www.sei.cmu.edu/library/enabling-agility-through-architecture-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/executive-overview-employing-soa-to-achieve-information-dominance/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/executive-overview-best-practices-for-adoption-of-cloud-computing/</loc></url><url><loc>https://www.sei.cmu.edu/library/cloud-computing-basics-explained/</loc></url><url><loc>https://www.sei.cmu.edu/library/exploring-acquisition-strategies-for-adopting-a-software-product-line/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-illusion-of-certainty-paper/</loc></url><url><loc>https://www.sei.cmu.edu/library/edge-enabled-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/maximizing-your-process-improvement-roi-through-harmonization/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-hard-choices-game-explained/</loc></url><url><loc>https://www.sei.cmu.edu/library/evaluating-softwares-impact-on-system-and-system-and-system-of-systems-reliability/</loc></url><url><loc>https://www.sei.cmu.edu/library/industry-standard-notation-for-architecture-centric-model-based-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/acquisition-archetype-shooting-the-messenger/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-everyday-example-of-architecture-documentation-subway-maps/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-economics-of-cmmi/</loc></url><url><loc>https://www.sei.cmu.edu/library/acquisition-archetypes-brooks-law/</loc></url><url><loc>https://www.sei.cmu.edu/library/acquisition-archetypes-happy-path-testing/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-and-medical-device-engineering/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/revealing-cost-drivers-for-systems-integration-and-interoperability-through-q-methodology/</loc></url><url><loc>https://www.sei.cmu.edu/library/acquisition-archetypes-robbing-peter-to-pay-paul/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-archetypes-longer-begets-bigger/</loc><lastmod>2024-04-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/assurance-cases-for-design-analysis-of-complex-system-of-systems-software/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/evaluating-hazard-mitigations-with-dependability-cases/</loc></url><url><loc>https://www.sei.cmu.edu/library/risk-detection-and-mitigation-metrics-and-design-check-lists-for-real-time-and-embedded-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/acquisition-archetypes-everything-for-everybody/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-software-quality-profile/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrating-quality-attribute-reasoning-frameworks-in-the-arche-design-assistant/</loc></url><url><loc>https://www.sei.cmu.edu/library/acquisition-archetypes-staff-burnout-and-turnover/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-archetypes-underbidding-the-contract/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/leadership-and-management-in-software-architecture/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-value-of-harmonizing-multiple-improvement-technologies-a-process-improvement-professionals-view/</loc></url><url><loc>https://www.sei.cmu.edu/library/strategic-technology-selection-and-classification-in-multimodel-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-secure-systems-using-model-based-engineering-and-architectural-models/</loc><lastmod>2024-05-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-model-based-engineering-and-architectural-models-to-build-secure-systems/</loc><lastmod>2024-05-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-archetypes-firefighting/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-archetypes-pmo-versus-contractor-hostility/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-archetypes-feeding-the-sacred-cow/</loc></url><url><loc>https://www.sei.cmu.edu/library/improvement-technology-classification-and-composition-in-multimodel-environments/</loc><lastmod>2024-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/process-architecture-in-a-multimodel-environment/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/implementation-challenges-in-a-multimodel-environment/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/diagrams-and-languages-for-model-based-software-engineering-of-embedded-systems-uml-and-aadl/</loc><lastmod>2024-05-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-archetypes-the-bow-wave-effect/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/four-pillars-of-service-oriented-architecture/</loc><lastmod>2024-03-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/business-rules-for-cmmi-focus-topics/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-dont-they-practice-what-we-preach/</loc></url><url><loc>https://www.sei.cmu.edu/library/saam-a-method-for-analyzing-the-properties-of-software-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/copper-manual-tutorial-and-specification-grammar/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/precise-buffer-overflow-detection-via-model-checking/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-the-open-process-framework-to-produce-a-situation-specific-requirements-engineering-method/</loc></url><url><loc>https://www.sei.cmu.edu/library/obtaining-the-benefits-of-predictable-assembly-from-certifiable-components-pacc/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-comfort-reasoning-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/word-level-predicate-abstraction-and-refinement-for-verifying-rtl-verilog/</loc></url><url><loc>https://www.sei.cmu.edu/library/method-engineering-and-cots-evaluation/</loc></url><url><loc>https://www.sei.cmu.edu/library/reflections-on-software-agility-and-agile-methods-challenges-dilemmas-and-the-way-ahead/</loc></url><url><loc>https://www.sei.cmu.edu/library/industry-best-practices-in-achieving-service-oriented-architecture/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/predicate-abstraction-with-minimum-predicates/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/upgrading-from-sw-cmm-to-cmmi/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-taxonomy-of-safety-related-requirements/</loc></url><url><loc>https://www.sei.cmu.edu/library/measurement-and-analysis-what-can-and-does-go-wrong/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/networked-technologies-the-role-of-networks-in-the-diffusion-and-adoption-of-software-process-improvement-spi-approaches/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-patents-innovation-or-litigation/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cots-usage-risk-evaluation-participants-overview/</loc></url><url><loc>https://www.sei.cmu.edu/library/conflict-patterns-toward-identifying-suitable-middleware/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-software-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/eight-architecture-lessons-from-history/</loc></url><url><loc>https://www.sei.cmu.edu/library/developing-a-communication-strategy-for-a-research-institute/</loc></url><url><loc>https://www.sei.cmu.edu/library/analyzing-and-specifying-reusable-security-requirements/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/gobus-toolkit-3-core-a-grid-service-container-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/organisational-interoperability-maturity-model-for-c2/</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measurement-and-analysis-in-capability-maturity-model-integration-models-and-software-process-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/preserving-real-concurrency/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-sae-avionics-architecture-description-language-aadl-standard-a-basis-for-model-based-architecture-driven-embedded-systems-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-design-implementation/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/quantifying-the-value-of-architecture-design-decisions-lessons-from-the-field/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/distributed-software-from-component-model-to-software-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/issues-in-predicting-the-reliability-of-components/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-potential-for-synergy-between-certification-and-insurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/is-third-party-certification-necessary/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/quality-attribute-design-primitives-and-the-attribute-driven-design-method/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-variability-in-software-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/defining-and-understanding-software-measurement-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/simulation-an-enabling-technology-in-software-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/study-of-the-interdependencies-within-the-banking-and-finance-infrastructure-for-survivability-research/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-architectural-transformation/</loc></url><url><loc>https://www.sei.cmu.edu/library/consistency-in-dynamic-reconfiguration/</loc></url><url><loc>https://www.sei.cmu.edu/library/dod-security-needs-and-cots-based-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-summary-of-dod-cots-related-policies/</loc></url><url><loc>https://www.sei.cmu.edu/library/view-extraction-and-view-fusion-in-architectural-understanding/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/case-study-evaluating-cots-products-for-dod-information-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/case-study-significant-schedule-delays-in-a-complex-ndi-based-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-architecture-tradeoff-analysis-method-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/assessing-architectural-complexity/</loc></url><url><loc>https://www.sei.cmu.edu/library/isolating-faults-in-complex-cots-based-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/cots-and-open-systems-monograph/</loc></url><url><loc>https://www.sei.cmu.edu/library/requirements-for-integrating-software-architecture/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/classifying-architectural-elements-as-a-foundation-for-mechanism-matching/</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-approach-to-software-architecture-analysis-for-evolution-and-reusability/</loc></url><url><loc>https://www.sei.cmu.edu/library/assessing-design-quality-from-a-software-architectural-perspective/</loc></url><url><loc>https://www.sei.cmu.edu/library/case-study-correcting-system-failure-in-a-cots-information-system-monograph/</loc></url><url><loc>https://www.sei.cmu.edu/library/assembling-large-systems-from-cots-components-monograph/</loc><lastmod>2025-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/estimating-with-objects-part-xi/</loc></url><url><loc>https://www.sei.cmu.edu/library/estimating-with-objects-part-x/</loc></url><url><loc>https://www.sei.cmu.edu/library/estimating-with-objects-part-ix/</loc><lastmod>2023-10-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/estimating-with-objects-part-viii/</loc></url><url><loc>https://www.sei.cmu.edu/library/estimating-with-objects-part-vii/</loc></url><url><loc>https://www.sei.cmu.edu/library/estimating-with-objects-part-vi/</loc></url><url><loc>https://www.sei.cmu.edu/library/estimating-with-objects-part-v/</loc></url><url><loc>https://www.sei.cmu.edu/library/scenario-based-analysis-of-software-architecture/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/estimating-with-objects-part-iv/</loc></url><url><loc>https://www.sei.cmu.edu/library/estimating-with-objects-part-iii/</loc></url><url><loc>https://www.sei.cmu.edu/library/estimating-with-objects-part-ii/</loc></url><url><loc>https://www.sei.cmu.edu/library/estimating-with-objects-part-i/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-survey-of-architecture-description-languages/</loc></url><url><loc>https://www.sei.cmu.edu/library/credibility-and-commitment/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-case-study-in-requirements-for-survivable-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/tool-support-for-architecture-analysis-and-design/</loc></url><url><loc>https://www.sei.cmu.edu/library/from-subroutines-to-subsystems-component-based-software-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-changing-world-of-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/formal-methods-in-describing-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/assessing-the-quality-of-large-software-intensive-systems-a-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-architectural-analysis-case-studyinternet-information-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/understanding-architectural-influences-and-decisions-in-large-system-projects/</loc></url><url><loc>https://www.sei.cmu.edu/library/features-of-architecture-description-languages/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-architectural-analysis-case-study-internet-information-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-case-study-in-assessing-the-maintainability-of-large-software-intensive-systems-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-software-architecture-renaissance/</loc></url><url><loc>https://www.sei.cmu.edu/library/from-domain-models-to-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/common-misconceptions-about-service-oriented-architecture/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-taxonomy-of-security-related-requirements/</loc></url><url><loc>https://www.sei.cmu.edu/library/primer-on-soa-terms/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-intelligence-tradecraft-project-summary-of-key-findings/</loc></url><url><loc>https://www.sei.cmu.edu/library/statistical-methods-for-flow-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/nvisionip-an-animated-state-analysis-tool-for-visualizing-netflows-white-paper/</loc></url><url><loc>https://www.sei.cmu.edu/library/ip-flow-information-export-ipfix-applicability-and-future-suggestions-for-network-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/detecting-distributed-attacks-using-network-wide-flow-traffic/</loc></url><url><loc>https://www.sei.cmu.edu/library/canine-a-netflows-converteranonymizer-tool-for-format-interoperability-and-secure-sharing-white-paper/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/correlations-between-quiescent-ports-in-network-flows-white-paper/</loc></url><url><loc>https://www.sei.cmu.edu/library/r-a-proposed-analysis-and-visualization-environment-for-network-security-data-white-paper/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-proposed-translation-data-model-for-flow-format-interoperability/</loc></url><url><loc>https://www.sei.cmu.edu/library/flow-data-compressibility-changes-during-internet-worm-outbreaks/</loc></url><url><loc>https://www.sei.cmu.edu/library/identifying-p2p-heavy-hitters-from-network-flow-data/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/visflowconnect-ip-an-animated-link-analysis-tool-for-visualizing-netflows-white-paper/</loc></url><url><loc>https://www.sei.cmu.edu/library/visflowconnet-ip-an-animated-link-analysis-tool-for-visualizing-netflows/</loc></url><url><loc>https://www.sei.cmu.edu/library/anomaly-detection-through-blind-flow-analysis-inside-a-local-network-white-paper/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/identifying-anomalous-network-traffic-through-the-use-of-client-port-distribution/</loc></url><url><loc>https://www.sei.cmu.edu/library/ipfixpsamp-what-future-standards-can-offer-to-network-security-white-paper/</loc></url><url><loc>https://www.sei.cmu.edu/library/attribution-and-aggregation-of-network-flows-for-security-analysis-white-paper/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-effect-of-packet-sampling-on-anomaly-detection/</loc></url><url><loc>https://www.sei.cmu.edu/library/rave-the-retrospective-analysis-and-visualization-engine/</loc></url><url><loc>https://www.sei.cmu.edu/library/scalable-flow-analysis-white-paper/</loc></url><url><loc>https://www.sei.cmu.edu/library/system-requirements-for-flow-processing/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-traffic-analysis-of-a-small-private-network-compromised-by-an-online-gaming-host-white-paper/</loc></url><url><loc>https://www.sei.cmu.edu/library/on-the-anonymization-and-deanonymization-of-netflow-traffic/</loc></url><url><loc>https://www.sei.cmu.edu/library/assessing-disclosure-risk-in-anonymized-datasets/</loc><lastmod>2024-03-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/four-pillars-for-improving-the-quality-of-safety-critical-software-reliant-systems/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/common-sense-guide-to-prevention-and-detection-of-insider-threats-3rd-edition-version-31/</loc></url><url><loc>https://www.sei.cmu.edu/library/effectiveness-of-the-vulnerability-response-decision-assistance-vrda-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/technical-trends-in-phishing-attacks/</loc></url><url><loc>https://www.sei.cmu.edu/library/spyware/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-governance-and-guidance/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-online-learning-approach-to-information-systems-security-education/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-resiliency-engineering-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/mitre-cwe-and-cert-secure-coding-standards/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-plan/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-use-of-malware-analysis-in-support-of-law-enforcement/</loc></url><url><loc>https://www.sei.cmu.edu/library/botnets-as-a-vehicle-for-online-crime/</loc></url><url><loc>https://www.sei.cmu.edu/library/fishing-for-phishes-applying-capture-recapture-methods-to-estimate-phishing-populations/</loc></url><url><loc>https://www.sei.cmu.edu/library/sets-bags-and-rock-and-roll-analyzing-large-data-sets-of-network-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/finding-peer-to-peer-file-sharing-using-coarse-network-behaviors/</loc></url><url><loc>https://www.sei.cmu.edu/library/existence-plots-a-low-resolution-time-series-for-port-behavior-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-continuous-time-list-capture-model-for-internet-threats/</loc></url><url><loc>https://www.sei.cmu.edu/library/locality-a-new-paradigm-for-thinking-about-normal-behavior-and-outsider-threat/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-empirical-analysis-of-target-resident-dos-filters/</loc></url><url><loc>https://www.sei.cmu.edu/library/hit-list-worm-detection-and-bot-identification-in-large-networks-using-protocol-graphs/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-centaur-system-helping-to-protect-the-niprnet/</loc></url><url><loc>https://www.sei.cmu.edu/library/advanced-security-reporting-systems-for-large-network-situational-awareness/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-model-for-opportunistic-network-exploits-the-case-of-p2p-worms/</loc></url><url><loc>https://www.sei.cmu.edu/library/adapting-the-square-method-for-security-requirements-engineering-to-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-theft-of-intellectual-property-for-business-advantage-a-preliminary-model/</loc><lastmod>2024-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/simulating-insider-cyber-threat-risks-a-model-based-case-and-a-case-based-model/</loc></url><url><loc>https://www.sei.cmu.edu/library/merit-interactive-insider-threat-training-simulator/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-study-illicit-cyber-activity-in-the-government-sector-executive-summary/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-study-illicit-cyber-activity-in-the-information-technology-and-telecommunications-sector-executive-summary/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-in-the-software-lifecycle/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/instructional-case-of-insider-threat-in-the-sdlc-the-case-of-insureacure-inc/</loc></url><url><loc>https://www.sei.cmu.edu/library/secret-service-and-cert-release-report-analyzing-acts-of-insider-sabotage-via-computer-systems-in-critical-infrastructure-sectors/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-study-illicit-cyber-activity-in-the-government-sector/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-study-illicit-cyber-activity-in-the-information-technology-and-telecommunications-sector/</loc></url><url><loc>https://www.sei.cmu.edu/library/2005-e-crime-watch-survey-findings/</loc></url><url><loc>https://www.sei.cmu.edu/library/management-and-education-of-the-risk-of-insider-threat-merit-system-dynamics-modeling-of-computer-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/spotlight-on-malicious-insiders-with-ties-to-the-internet-underground-community/</loc></url><url><loc>https://www.sei.cmu.edu/library/spotlight-on-insider-threat-from-trusted-business-partners/</loc></url><url><loc>https://www.sei.cmu.edu/library/2005-e-crime-watch-survey-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threats-to-cloud-computing-directions-for-new-research-challenges/</loc></url><url><loc>https://www.sei.cmu.edu/library/chronological-examination-of-insider-threat-sabotage-preliminary-observations/</loc></url><url><loc>https://www.sei.cmu.edu/library/digital-investigation-workforce-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/2001-tech-tip-cross-site-scripting-vulnerabilities/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-analysis-of-security-incidents-on-the-internet/</loc></url><url><loc>https://www.sei.cmu.edu/library/2001-tech-tip-using-pgp-to-verify-digital-signatures/</loc><lastmod>2024-06-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2002-tech-tip-a-brief-tour-of-the-simple-network-management-protocol/</loc></url><url><loc>https://www.sei.cmu.edu/library/2001-tech-tip-managing-the-threat-of-denial-of-service-attacks/</loc></url><url><loc>https://www.sei.cmu.edu/library/2001-tech-tip-trends-in-denial-of-service-attack-technology/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2002-tech-tip-securing-an-internet-name-server/</loc><lastmod>2024-03-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/information-technology-programming-languages-their-environments-and-system-software-interfaces-specification-for-managed-strings/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/results-of-the-security-in-activex-workshop/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/results-of-the-distributed-systems-intruder-tools-workshop/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-state-of-information-security-law-a-focus-on-the-key-legal-trends/</loc></url><url><loc>https://www.sei.cmu.edu/library/computational-evaluation-of-software-security-attributes/</loc></url><url><loc>https://www.sei.cmu.edu/library/next-generation-software-engineering-function-extraction-for-computation-of-software-behavior/</loc><lastmod>2024-01-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/introducing-function-extraction-into-software-testing-july-2008/</loc></url><url><loc>https://www.sei.cmu.edu/library/function-extraction-automated-behavior-computation-for-aerospace-software-verification-and-certification/</loc></url><url><loc>https://www.sei.cmu.edu/library/csirt-services/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/limits-to-effectiveness-in-computer-security-incident-response-teams/</loc></url><url><loc>https://www.sei.cmu.edu/library/steps-for-creating-national-csirts/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-an-incident-management-body-of-knowledge/</loc></url><url><loc>https://www.sei.cmu.edu/library/action-list-for-developing-a-computer-security-incident-response-team-csirt/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-state-of-information-security-law-a-focus-on-the-key-legal-trends-2/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/communication-among-incident-responders-a-study-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/maap-information-sheet/</loc></url><url><loc>https://www.sei.cmu.edu/library/preliminary-system-dynamics-maps-of-the-insider-cyber-threat-problem/</loc></url><url><loc>https://www.sei.cmu.edu/library/2004-e-crime-watch-survey-findings/</loc></url><url><loc>https://www.sei.cmu.edu/library/spotlight-on-insider-threat-from-trusted-business-partners-version-2-updated-and-revised/</loc></url><url><loc>https://www.sei.cmu.edu/library/spotlight-on-insider-theft-of-intellectual-property-inside-the-united-states-involving-foreign-governments-or-organizations-2009/</loc></url><url><loc>https://www.sei.cmu.edu/library/principles-of-survivability-and-information-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/spotlight-on-programming-techniques-used-as-an-insider-attack-tool/</loc></url><url><loc>https://www.sei.cmu.edu/library/monitoring-cloud-computing-by-layer-part-1/</loc></url><url><loc>https://www.sei.cmu.edu/library/monitoring-cloud-computing-by-layer-part-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/vulnerability-detection-in-activex-controls-through-automated-fuzz-testing/</loc></url><url><loc>https://www.sei.cmu.edu/library/0-knowledge-fuzzing/</loc></url><url><loc>https://www.sei.cmu.edu/library/instrumented-fuzz-testing-using-air-integers-whitepaper/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2011-proceedings/</loc></url><url><loc>https://www.sei.cmu.edu/library/resiliency-management-model-communications/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-for-executives/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-for-executives-mapping-of-common-topics-to-specific-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-incident-object-description-exchange-format-iodef-implementation-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/home-computer-security/</loc><lastmod>2024-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/governing-for-enterprise-security-ges-implementation-guide-article-1-characteristics-of-effective-security-governance1/</loc></url><url><loc>https://www.sei.cmu.edu/library/governing-for-enterprise-security-ges-implementation-guide-article-2-defining-an-effective-enterprise-security-program-esp/</loc></url><url><loc>https://www.sei.cmu.edu/library/governing-for-enterprise-security-ges-implementation-guide-article-3-enterprise-security-governance-activities/</loc></url><url><loc>https://www.sei.cmu.edu/library/governing-for-enterprise-security-implementation-guide-sample-artifact-roles-and-responsibilities-for-an-enterprise-security-program/</loc><lastmod>2024-08-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/foundations-of-the-survivability-and-information-assurance-curriculum/</loc></url><url><loc>https://www.sei.cmu.edu/library/survivability-and-information-assurance-curriculum-overview/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/survivability-and-information-assurance-curriculum-lab-overview/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/pointer-ownership-model-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-impact-of-passive-dns-collection-on-end-user-privacy/</loc></url><url><loc>https://www.sei.cmu.edu/library/correlating-domain-registrations-and-dns-first-activity-in-general-and-for-malware/</loc></url><url><loc>https://www.sei.cmu.edu/library/yaf-yet-another-flowmeter/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/modifying-lanchesters-equations-for-modeling-and-evaluating-malicious-domain-name-take-down/</loc></url><url><loc>https://www.sei.cmu.edu/library/passive-detection-of-misbehaving-name-servers-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-probabilistic-population-study-of-the-conficker-c-botnet/</loc></url><url><loc>https://www.sei.cmu.edu/library/finding-malicious-activity-in-bulk-dns-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/rayon-a-unified-framework-for-data-visualization/</loc></url><url><loc>https://www.sei.cmu.edu/library/technical-debt-from-metaphor-to-theory-and-practice/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/maturity-models-101-a-primer-for-applying-maturity-models-to-smart-grid-security-resilience-and-interoperability/</loc></url><url><loc>https://www.sei.cmu.edu/library/discerning-the-intent-of-maturity-models-from-characterizations-of-security-posture/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/common-software-platforms-in-system-of-systems-architectures-the-state-of-the-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/five-smart-grid-questions-every-utility-executive-should-ask/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-you-can-help-your-utility-clients-with-a-critical-aspect-of-smart-grid-transformation-they-might-be-overlooking/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-security-review-of-current-research-and-pilot-usage/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-defect-prioritization-method-based-on-the-risk-priority-number/</loc></url><url><loc>https://www.sei.cmu.edu/library/spotlight-on-programmers-as-malicious-insidersupdated-and-revised/</loc></url><url><loc>https://www.sei.cmu.edu/library/applicability-of-cultural-markers-in-computer-network-attack-attribution/</loc><lastmod>2023-11-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-topological-properties-of-the-local-clustering-coefficient/</loc></url><url><loc>https://www.sei.cmu.edu/library/foundations-for-software-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-perils-of-treating-software-as-a-specialty-engineering-discipline/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-assurance/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measuring-software-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/foundations-for-survivable-systems-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/strengths-in-security-solutions/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/everything-you-wanted-to-know-about-blacklists-but-were-afraid-to-ask/</loc></url><url><loc>https://www.sei.cmu.edu/library/state-of-cyber-workforce-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-readiness-fit-analysis-is-your-organization-ready-for-agile/</loc></url><url><loc>https://www.sei.cmu.edu/library/precise-static-analysis-of-taint-flow-for-android-application-sets/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-overview-the-challenges/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/adapting-penetration-testing-for-software-development-purposes/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/arguing-security-creating-security-assurance-cases/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/assembly-integration-and-evolution-overview/</loc></url><url><loc>https://www.sei.cmu.edu/library/application-firewalls-and-proxies-introduction-and-concept-of-operations/</loc></url><url><loc>https://www.sei.cmu.edu/library/assurance-cases-overview/</loc></url><url><loc>https://www.sei.cmu.edu/library/assuring-software-systems-security-life-cycle-considerations-for-government-acquisitions/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-a-body-of-knowledge-for-ict-supply-chain-risk-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-security-into-the-business-acquisition-process/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-common-sense-way-to-make-the-business-case-for-software-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/defining-computer-security-incident-response-teams/</loc></url><url><loc>https://www.sei.cmu.edu/library/defining-the-discipline-of-secure-software-assurance-initial-findings-from-the-national-software-assurance-repository/</loc></url><url><loc>https://www.sei.cmu.edu/library/deploying-and-operating-secure-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/deployment-and-operations-references/</loc><lastmod>2024-03-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/development-of-a-master-of-software-assurance-reference-curriculum-2013-ijsse/</loc></url><url><loc>https://www.sei.cmu.edu/library/estimating-benefits-from-investing-in-secure-software-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/evidence-of-assurance-laying-the-foundation-for-a-credible-security-case/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/finding-a-vendor-you-can-trust-in-the-global-marketplace/</loc></url><url><loc>https://www.sei.cmu.edu/library/foundations-for-software-assurance-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/framing-security-as-a-governance-and-management-concern-risks-and-opportunities/</loc></url><url><loc>https://www.sei.cmu.edu/library/general-modeling-concepts/</loc></url><url><loc>https://www.sei.cmu.edu/library/getting-secure-software-assurance-knowledge-into-conventional-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/governance-and-management-references/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-much-security-is-enough/</loc></url><url><loc>https://www.sei.cmu.edu/library/improving-software-assurance/</loc><lastmod>2023-10-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/incident-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/individual-certification-of-security-proficiency-for-software-professionals-where-are-we-where-are-we-going/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/integrating-security-and-it/</loc></url><url><loc>https://www.sei.cmu.edu/library/alternatives-to-signatures-alts/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrating-software-assurance-knowledge-into-conventional-curricula/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-modeling-tools-for-software-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-system-strategies/</loc></url><url><loc>https://www.sei.cmu.edu/library/making-the-business-case-for-software-assurance-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/maturity-of-practice/</loc><lastmod>2023-10-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measures-and-measurement-for-secure-software-development/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/modeling-tools-references/</loc></url><url><loc>https://www.sei.cmu.edu/library/models-for-assessing-the-cost-and-value-of-software-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/its-a-nice-idea-but-how-do-we-get-anyone-to-practice-it-a-staged-model-for-increasing-organizational-capability-in-software-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/optimizing-investments-in-security-countermeasures-a-practical-tool-for-fixed-budgets/</loc></url><url><loc>https://www.sei.cmu.edu/library/penetration-testing-tools/</loc></url><url><loc>https://www.sei.cmu.edu/library/plan-do-check-act/</loc></url><url><loc>https://www.sei.cmu.edu/library/predictive-models-for-identifying-software-components-prone-to-failure-during-security-attacks/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/prioritizing-it-controls-for-effective-measurable-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/requirements-elicitation-case-studies-using-ibis-jad-and-arm/</loc><lastmod>2024-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/requirements-elicitation-introduction/</loc></url><url><loc>https://www.sei.cmu.edu/library/requirements-engineering-annotated-bibliography/</loc></url><url><loc>https://www.sei.cmu.edu/library/requirements-prioritization-case-study-using-ahp/</loc><lastmod>2023-10-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/risk-centered-practices/</loc></url><url><loc>https://www.sei.cmu.edu/library/scale-system-development-challenges/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-software-development-life-cycle-processes/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-and-project-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-is-not-just-a-technical-issue/</loc><lastmod>2023-10-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/security-requirements-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-specific-bibliography/</loc></url><url><loc>https://www.sei.cmu.edu/library/square-process/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/supply-chain-risk-management-incorporating-security-into-software-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-education-overview/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-engineering-bibliography/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-security-engineering-a-guide-for-project-managers-white-paper/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-systemic-approach-for-assessing-software-supply-chain-risk/</loc></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-influences-on-acquisition-strategy-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/system-strategies-references/</loc></url><url><loc>https://www.sei.cmu.edu/library/teaching-security-requirements-engineering-using-square/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-common-criteria/</loc><lastmod>2023-10-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-development-of-a-graduate-curriculum-for-software-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-evaluation-of-cost-benefit-using-security-requirements-prioritization-methods/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-influence-of-system-properties-on-software-assurance-and-project-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/measuring-the-software-security-requirements-engineering-process/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-measures-do-vendors-use-for-software-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/two-nationally-sponsored-initiatives-for-disseminating-assurance-knowledge/</loc></url><url><loc>https://www.sei.cmu.edu/library/navigating-the-security-practice-landscape/</loc></url><url><loc>https://www.sei.cmu.edu/library/requirements-prioritization-introduction/</loc><lastmod>2023-10-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-role-of-computer-security-incident-response-teams-in-the-software-development-life-cycle/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-software-assurance-competency-model-a-roadmap-to-enhance-individual-professional-capability/</loc></url><url><loc>https://www.sei.cmu.edu/library/training-and-awareness/</loc></url><url><loc>https://www.sei.cmu.edu/library/trustworthy-composition-the-system-is-not-always-the-sum-of-its-parts/</loc></url><url><loc>https://www.sei.cmu.edu/library/strengthening-ties-between-process-and-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/abuse-of-customer-premise-equipment-and-recommended-actions/</loc></url><url><loc>https://www.sei.cmu.edu/library/domain-parking-not-as-malicious-as-expected/</loc></url><url><loc>https://www.sei.cmu.edu/library/blacklist-ecosystem-analysis-update-2014/</loc><lastmod>2023-10-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-spruce-project-curating-recommended-practices-for-software-producibility/</loc></url><url><loc>https://www.sei.cmu.edu/library/scale-analysis-of-jasper-codebase/</loc><lastmod>2024-06-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/covert-channel-detection-using-process-query-systems-white-paper/</loc></url><url><loc>https://www.sei.cmu.edu/library/comments-on-bureau-of-industry-and-security-bis-proposed-rule-regarding-wassenaar-arrangement-2013-plenary-agreements-implementation-for-intrusion-and-surveillance-items/</loc></url><url><loc>https://www.sei.cmu.edu/library/cnd-equities-strategy/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/effective-insider-threat-programs-understanding-and-avoiding-potential-pitfalls/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-considerations-for-vehicles/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-analysis-of-an-aadl-code-generators-runtime-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/analytic-approaches-to-detect-insider-threats/</loc></url><url><loc>https://www.sei.cmu.edu/library/dod-software-factbook/</loc></url><url><loc>https://www.sei.cmu.edu/library/malware-capability-development-patterns-respond-to-defenses-two-case-studies/</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/on-board-diagnostics-risks-and-vulnerabilities-of-the-connected-vehicle/</loc><lastmod>2024-05-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-quelce-method-using-change-drivers-to-estimate-program-costs-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/blacklist-ecosystem-analysis-2016-update/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/striving-for-effective-cyber-workforce-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-third-party-risk-in-financial-services-organizations-a-resilience-based-approach/</loc></url><url><loc>https://www.sei.cmu.edu/library/faa-research-project-on-system-complexity-effects-on-aircraft-safety-literature-search-to-define-complexity-for-avionics-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/faa-research-project-on-system-complexity-effects-on-aircraft-safety-candidate-complexity-metrics/</loc><lastmod>2023-10-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/faa-research-project-on-system-complexity-effects-on-aircraft-safety-identifying-the-impact-of-complexity-on-safety/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/faa-research-project-on-system-complexity-effects-on-aircraft-safety-estimating-complexity-of-a-safety-argument/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/faa-research-project-on-system-complexity-effects-on-aircraft-safety-testing-the-identified-metrics/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/square-frequently-asked-questions-faq/</loc></url><url><loc>https://www.sei.cmu.edu/library/columbia-csirt-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/tunisia-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/financial-institution-csirt-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/blacklist-ecosystem-analysis-january-june-2016/</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-rmm-capability-appraisals/</loc><lastmod>2024-03-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/csirt-frequently-asked-questions-faq/</loc></url><url><loc>https://www.sei.cmu.edu/library/skills-needed-when-staffing-your-csirt/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/developing-an-acquisition-strategy/</loc></url><url><loc>https://www.sei.cmu.edu/library/create-a-csirt/</loc></url><url><loc>https://www.sei.cmu.edu/library/cots-based-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/supply-chain-and-commercial-off-the-shelf-cots-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-arcade-game-maker-pedagogical-product-line/</loc></url><url><loc>https://www.sei.cmu.edu/library/establishing-trusted-identities-in-disconnected-edge-environments-2/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/predictability-by-construction/</loc></url><url><loc>https://www.sei.cmu.edu/library/pervasive-mobile-computing/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-physical-systems-2/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ultra-large-scale-systems-socio-adaptive-systems/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-ciso-academy/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-framework-for-software-product-line-practice-version-50/</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/1995-cert-advisories/</loc><lastmod>2024-04-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/1996-cert-advisories/</loc><lastmod>2024-01-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/1997-cert-advisories/</loc><lastmod>2024-01-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/1998-cert-advisories/</loc><lastmod>2024-01-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/1999-cert-advisories/</loc><lastmod>2024-01-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2000-cert-advisories/</loc><lastmod>2024-01-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2001-cert-advisories/</loc><lastmod>2026-04-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2002-cert-advisories/</loc><lastmod>2024-01-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2003-cert-advisories/</loc><lastmod>2024-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2004-cert-advisories/</loc><lastmod>2024-03-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/1988-cert-advisories/</loc></url><url><loc>https://www.sei.cmu.edu/library/1989-cert-advisories/</loc><lastmod>2024-01-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/1990-cert-advisories/</loc></url><url><loc>https://www.sei.cmu.edu/library/1991-cert-advisories/</loc></url><url><loc>https://www.sei.cmu.edu/library/1993-cert-advisories/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/1994-cert-advisories/</loc></url><url><loc>https://www.sei.cmu.edu/library/1992-cert-advisories/</loc></url><url><loc>https://www.sei.cmu.edu/library/1998-cert-incident-notes/</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/1999-cert-incident-notes/</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2000-cert-incident-notes/</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2001-cert-incident-notes/</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2002-cert-incident-notes/</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2003-cert-incident-notes/</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-research-2003-annual-report/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2004-cert-incident-notes/</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/1997-tech-tip-denial-of-service-attacks/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2002-tech-tip-email-bombing-and-spamming/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2000-tech-tip-frequently-asked-questions-about-malicious-web-scripts-redirected-by-web-sites/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2001-tech-tip-home-network-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/2002-tech-tip-securing-your-web-browser/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2000-tech-tip-understanding-malicious-content-mitigation-for-web-developers/</loc></url><url><loc>https://www.sei.cmu.edu/library/2002-tech-tip-spoofedforged-email/</loc></url><url><loc>https://www.sei.cmu.edu/library/2000-tech-tip-finding-site-contacts/</loc><lastmod>2023-11-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2002-tech-tip-problems-with-the-ftp-port-command-or-why-you-dont-want-just-any-port-in-a-storm/</loc><lastmod>2024-03-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2006-tech-tip-unix-configuration-guidelines/</loc></url><url><loc>https://www.sei.cmu.edu/library/2000-tech-tip-steps-for-recovering-from-a-unix-or-nt-system-compromise/</loc><lastmod>2024-03-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2003-tech-tip-w32blaster-recovery-tips/</loc></url><url><loc>https://www.sei.cmu.edu/library/before-you-connect-a-new-computer-to-the-internet/</loc></url><url><loc>https://www.sei.cmu.edu/library/frequently-asked-questions-about-the-melissa-virus/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/simple-network-management-protocol-snmp-vulnerabilities-frequently-asked-questions-faq/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-certified-psp-developer-examination-sample-questions/</loc></url><url><loc>https://www.sei.cmu.edu/library/ieee-computer-societysoftware-engineering-institute-watts-s-humphrey-software-process-achievement-award/</loc></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-software-architecture-evaluation/</loc><lastmod>2023-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/guide-to-software-architecture-tools/</loc></url><url><loc>https://www.sei.cmu.edu/library/blacklist-ecosystem-analysis-july-december-2016/</loc><lastmod>2023-11-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/federal-virtual-training-environment-fedvte/</loc></url><url><loc>https://www.sei.cmu.edu/library/blacklist-ecosystem-analysis-january-june-2017/</loc><lastmod>2023-11-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-practices-for-complex-contexts/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-development-in-government-myths-monsters-and-fables/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-acquisition-and-milestone-reviews/</loc></url><url><loc>https://www.sei.cmu.edu/library/adopting-agile-in-dod-it-acquisitions/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-culture-in-the-dod/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-development-and-dod-acquisitions/</loc></url><url><loc>https://www.sei.cmu.edu/library/estimating-in-agile-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/management-and-contracting-practices-for-agile-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/embedded-device-vulnerability-analysis-case-study-using-trommel/</loc></url><url><loc>https://www.sei.cmu.edu/library/roadmap-to-software-assurance-competency/</loc></url><url><loc>https://www.sei.cmu.edu/library/smart-grid-maturity-model-matrix-version-12/</loc><lastmod>2024-05-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-product-line-bibliography/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-publications/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/delivering-software-reliant-products-faster-help-your-organization-gain-speed-without-sacrificing-quality/</loc></url><url><loc>https://www.sei.cmu.edu/library/delivering-software-reliant-products-faster-take-action-to-help-your-organization-gain-speed-without-sacrificing-quality/</loc></url><url><loc>https://www.sei.cmu.edu/library/history-of-cert-rmm/</loc></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-assurance/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-rmm-version-12-release-notes/</loc></url><url><loc>https://www.sei.cmu.edu/library/blacklist-ecosystem-analysis-july-december-2017/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/navigating-the-insider-threat-tool-landscape-low-cost-technical-solutions-to-jump-start-an-insider-threat-program/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/threat-modeling-a-summary-of-available-methods/</loc></url><url><loc>https://www.sei.cmu.edu/library/seven-proposal-writing-tips-that-make-conference-program-committees-smile/</loc></url><url><loc>https://www.sei.cmu.edu/library/threat-modeling-for-cyber-physical-system-of-systems-methods-evaluation/</loc></url><url><loc>https://www.sei.cmu.edu/library/implementing-devops-practices-in-highly-regulated-environments/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/15-tips-for-preparing-and-delivering-a-great-presentation-at-saturn/</loc></url><url><loc>https://www.sei.cmu.edu/library/towards-improving-cvss/</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/practical-precise-taint-flow-static-analysis-for-android-app-sets/</loc></url><url><loc>https://www.sei.cmu.edu/library/infrastructure-as-code-final-report/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-approach-for-integrating-the-security-engineering-risk-analysis-sera-method-with-threat-modeling/</loc></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-careers-of-the-future/</loc><lastmod>2024-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-talent-identification-and-assessment/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-career-paths-and-progression/</loc><lastmod>2024-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/scaife-api-definition-beta-version-002-for-developers/</loc></url><url><loc>https://www.sei.cmu.edu/library/automatically-detecting-technical-debt-discussions/</loc></url><url><loc>https://www.sei.cmu.edu/library/multi-method-modeling-and-analysis-of-the-cybersecurity-vulnerability-management-ecosystem/</loc></url><url><loc>https://www.sei.cmu.edu/library/ai-engineering-11-foundational-practices/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/prioritizing-vulnerability-response-a-stakeholder-specific-vulnerability-categorization/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/penetration-tests-are-the-check-engine-light-on-your-security-operations/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/comments-on-nistir-8269-a-taxonomy-and-terminology-of-adversarial-machine-learning/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-risk-management-perspective-for-ai-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/creating-xbd-a-dataset-for-assessing-building-damage-from-satellite-imagery/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-evaluation-without-an-architecture-experience-with-the-smart-grid/</loc></url><url><loc>https://www.sei.cmu.edu/library/designing-for-incentives-better-information-sharing-for-better-software-engineering/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/resource-allocation-in-distributed-mixed-criticality-cyber-physical-systems/</loc><lastmod>2025-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/statistical-models-for-empirical-component-properties-and-assembly-level-property-predictions-toward-standard-labeling/</loc></url><url><loc>https://www.sei.cmu.edu/library/packaging-and-deploying-predictable-assembly/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/handling-interdependent-values-in-an-auction-mechanism-for-bandwidth-allocation-in-tactical-data-networks/</loc></url><url><loc>https://www.sei.cmu.edu/library/statistical-based-wcet-estimation-and-validation/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-evaluation-for-universal-command-and-control/</loc></url><url><loc>https://www.sei.cmu.edu/library/historical-analysis-of-exploit-availability-timelines/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-updated-framework-of-defenses-against-ransomware/</loc></url><url><loc>https://www.sei.cmu.edu/library/current-ransomware-threats/</loc></url><url><loc>https://www.sei.cmu.edu/library/nice-framework-cybersecurity-evaluator/</loc></url><url><loc>https://www.sei.cmu.edu/library/analytic-capabilities-for-improved-software-program-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/attack-surface-analysis-reduce-system-and-organizational-risk/</loc></url><url><loc>https://www.sei.cmu.edu/library/emerging-technologies-2020-six-areas-of-opportunity/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-engineering-risk-analysis-sera-threat-archetypes/</loc></url><url><loc>https://www.sei.cmu.edu/library/overview-of-practices-and-processes-of-the-cmmc-10-assessment-guides-cmmc-10/</loc><lastmod>2024-08-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/artificial-intelligence-ai-and-machine-learning-ml-acquisition-and-policy-implications/</loc></url><url><loc>https://www.sei.cmu.edu/library/prioritizing-vulnerability-response-a-stakeholder-specific-vulnerability-categorization-version-20/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-guidance-and-evaluation-sage-tool/</loc><lastmod>2024-08-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/scalable-ai/</loc></url><url><loc>https://www.sei.cmu.edu/library/robust-and-secure-ai/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/human-centered-ai/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-prototype-set-of-cloud-adoption-risk-factors/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-analysis-of-how-many-undiscovered-vulnerabilities-remain-in-information-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-xml-to-exchange-floating-point-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/operational-test-evaluation-ote-roadmap-for-cloud-based-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/modeling-to-support-dod-acquisition-lifecycle-events-version-14/</loc></url><url><loc>https://www.sei.cmu.edu/library/digital-engineering-effectiveness/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/coordinated-vulnerability-disclosure-user-stories/</loc></url><url><loc>https://www.sei.cmu.edu/library/common-sense-guide-to-mitigating-insider-threats-seventh-edition/</loc><lastmod>2024-02-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-security-framework-asf-an-acquisition-and-supplier-perspective-on-managing-software-intensive-systems-cybersecurity-risk/</loc><lastmod>2024-04-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/zero-trust-industry-day-experience-paper/</loc></url><url><loc>https://www.sei.cmu.edu/library/industry-best-practices-for-zero-trust-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-brief-introduction-to-the-evaluation-of-learned-models-for-aerial-object-detection/</loc></url><url><loc>https://www.sei.cmu.edu/library/program-managersthe-devsecops-pipeline-can-provide-actionable-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/zero-trust-industry-day-2022-areas-of-future-research/</loc></url><url><loc>https://www.sei.cmu.edu/library/sgmm-first-annual-report-on-smart-grid-implementation/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-year-in-review-fy-2011/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-year-in-review-fy-2010/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-year-in-review-fy-2009/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-annual-report-fy-2008/</loc><lastmod>2025-09-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-annual-report-fy-2007/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-annual-report-fy-2006/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-annual-report-fy-2005/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-annual-report-fy-2004/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-annual-report-fy-2003/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-annual-report-fy-2002/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-annual-report-fy-2001/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-year-in-review-fy-2012/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-coordination-center-1998-annual-report-summary/</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-coordination-center-2002-annual-report/</loc><lastmod>2026-04-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-coordination-center-2001-annual-report/</loc><lastmod>2026-04-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-coordination-center-2003-annual-report/</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-coordination-center-2000-annual-report/</loc><lastmod>2026-04-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-coordination-center-1999-annual-report-summary/</loc><lastmod>2026-04-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-coordination-center-1997-annual-report-summary/</loc><lastmod>2026-04-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-coordination-center-1996-annual-report-summary/</loc><lastmod>2026-04-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-coordination-center-1995-annual-report-summary/</loc><lastmod>2026-04-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-coordination-center-1994-annual-report-summary/</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2013-sei-year-in-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/2014-sei-year-in-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/2015-sei-year-in-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-research-review-2016-project-summaries-and-posters/</loc></url><url><loc>https://www.sei.cmu.edu/library/2014-research-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/2015-research-review-project-summaries/</loc></url><url><loc>https://www.sei.cmu.edu/library/2016-sei-year-in-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-2017-research-review-summaries/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2017-sei-year-in-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/project-summaries-and-posters-2018-research-review/</loc><lastmod>2024-01-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2018-year-in-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2019-project-descriptions-and-posters/</loc></url><url><loc>https://www.sei.cmu.edu/library/2019-sei-year-in-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/2020-sei-year-in-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2021-project-summaries-booklet/</loc></url><url><loc>https://www.sei.cmu.edu/library/2021-sei-year-in-review/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2022-project-summaries-booklet/</loc></url><url><loc>https://www.sei.cmu.edu/library/advanced-software-architecture-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-opportunities-for-sei-partners/</loc></url><url><loc>https://www.sei.cmu.edu/library/basics-about-the-smart-grid-maturity-model/</loc></url><url><loc>https://www.sei.cmu.edu/library/smart-grid-maturity-model-update-2011/</loc></url><url><loc>https://www.sei.cmu.edu/library/help-with-adoption-of-software-product-lines/</loc><lastmod>2023-11-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/attacking-network-and-software-complexities-tools-for-the-cyber-warrior/</loc><lastmod>2024-06-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-competence/</loc></url><url><loc>https://www.sei.cmu.edu/library/battlefield-mobile-computing/</loc></url><url><loc>https://www.sei.cmu.edu/library/soa-vendor-jungle/</loc><lastmod>2024-06-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-sei-research-technology-and-system-solutions-rtss-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/edge-enabled-tactical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-tradeoff-analysis-method-atam/</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-product-line-curriculum-2010/</loc></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-sos-practice-initiative/</loc></url><url><loc>https://www.sei.cmu.edu/library/product-line-practice-plp-initiative/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-centric-engineering-ace-initiative/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/experiments-with-service-oriented-computing-on-handheld-devices-in-tactical-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/smart-grid-maturity-model-update-october-2010/</loc></url><url><loc>https://www.sei.cmu.edu/library/ultra-large-scale-systems-study/</loc><lastmod>2025-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-software-assurance-initiative/</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/research-technology-and-system-solutions-program/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-join-the-network-of-connected-software-architecture-professionals/</loc></url><url><loc>https://www.sei.cmu.edu/library/training-course-modeling-system-architectures-using-aadl/</loc></url><url><loc>https://www.sei.cmu.edu/library/soa-migration-adoption-and-reuse-technique/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-software-product-line-diagnostics/</loc><lastmod>2024-06-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/assessing-and-improving-architecture-competence/</loc></url><url><loc>https://www.sei.cmu.edu/library/best-practices-for-successful-adoption-of-soa-one-day-training/</loc></url><url><loc>https://www.sei.cmu.edu/library/process-improvement-in-multimodel-environments-a-three-year-project-proposed-by-the-sei/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-sos-architecture-definition-and-evaluation/</loc></url><url><loc>https://www.sei.cmu.edu/library/pacc-starter-kit/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/distributed-project-governance-assessment/</loc></url><url><loc>https://www.sei.cmu.edu/library/smart-training-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-mosaic-rethinking-risk-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/computational-mechanism-design-for-allocating-tactical-network-bandwidth/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-centric-approach-to-predicting-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-centric-approach-to-predicting-system-resource-consumption/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-centric-approach-to-predicting-real-time-performance/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-centric-approach-to-predicting-system-reliability/</loc></url><url><loc>https://www.sei.cmu.edu/library/making-the-right-decision-about-soa/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/workshop-on-soa-governance/</loc><lastmod>2023-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/elearning-course-migrating-legacy-systems-to-soa-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-a-short-history/</loc></url><url><loc>https://www.sei.cmu.edu/library/assurance-for-software-reliant-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/engineering-performance-critical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/predictable-model-based-engineering-for-embedded-systems/</loc><lastmod>2024-05-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sae-architecture-analysis-and-design-language-fact-sheet/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/workshop-on-soa-strategy/</loc><lastmod>2024-03-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/predictability-by-construction-2/</loc><lastmod>2024-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-affiliate-brochure/</loc><lastmod>2024-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-books-from-sei-series-in-software-engineering/</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/serving-the-changing-needs-of-the-dod/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-product-lines-sei-training/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-design-and-analysis-sei-training/</loc><lastmod>2024-07-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/documenting-software-architectures-sei-training/</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/atam-evaluator-certificate/</loc></url><url><loc>https://www.sei.cmu.edu/library/launch-of-high-speed-high-capacity-trading-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/rtss-training-course-catalog/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-technical-debt-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/developing-architecture-centric-engineering-within-tsp/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecting-software-the-sei-way/</loc></url><url><loc>https://www.sei.cmu.edu/library/soa-migration-adoption-and-reuse-technique-family-members/</loc></url><url><loc>https://www.sei.cmu.edu/library/value-driven-incremental-development/</loc><lastmod>2025-06-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2011-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2012-call-for-papers/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2013-call-for-papers/</loc></url><url><loc>https://www.sei.cmu.edu/library/xnet-cert-exercise-network/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-curriculum-description/</loc></url><url><loc>https://www.sei.cmu.edu/library/guidelines-for-use-of-cert/</loc></url><url><loc>https://www.sei.cmu.edu/library/faq-collaboration-between-the-cert-coordination-center-and-computer-security-incident-response-teams-worldwide/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-vulnerability-assessment/</loc></url><url><loc>https://www.sei.cmu.edu/library/customized-insider-threat-executive-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/announcing-new-on-demand-training-software-assurance-for-executives/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2011-call-for-presentations-and-demonstrations/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2010-call-for-presentations-and-demonstrations/</loc><lastmod>2024-03-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2009-call-for-presentations/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2008-call-for-presentations/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2005-call-for-papers/</loc></url><url><loc>https://www.sei.cmu.edu/library/deploying-tsp-on-a-national-scale/</loc></url><url><loc>https://www.sei.cmu.edu/library/working-together-the-team-software-process-and-architecture-centric-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-engineering-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-principles-and-practices-sei-training/</loc></url><url><loc>https://www.sei.cmu.edu/library/product-line-practice-initiative/</loc></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-practice-initiative/</loc><lastmod>2024-06-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-software-product-line-curriculum/</loc></url><url><loc>https://www.sei.cmu.edu/library/sam-2014-call-for-papers/</loc></url><url><loc>https://www.sei.cmu.edu/library/advanced-mobile-systems-initiative/</loc></url><url><loc>https://www.sei.cmu.edu/library/quantifying-uncertainty-in-early-lifecycle-cost-estimation-quelce-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2014-sponsorship-opportunities/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-overview/</loc><lastmod>2024-06-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/essential-answers-about-sgmm/</loc><lastmod>2024-08-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-checkpoint-diagnostic/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-physical-and-ultra-large-scale-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/digital-infrastructure-creation-with-tactical-cloudlets/</loc></url><url><loc>https://www.sei.cmu.edu/library/advanced-mobile-systems-initiative-2014/</loc></url><url><loc>https://www.sei.cmu.edu/library/call-for-papers-sixth-workshop-on-managing-technical-debt-mtd-2014/</loc></url><url><loc>https://www.sei.cmu.edu/library/analyzing-timing-of-multicore-software-scheduling-a-new-way-that-makes-it-simple/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-program-manager-certificate/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-vulnerability-assessor-certificate/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-program-evaluator-certificate/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-insider-threat-center/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2011-program/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2015-sponsorship-opportunities/</loc></url><url><loc>https://www.sei.cmu.edu/library/group-autonomy-for-mobile-systems/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2015-submission-template/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2015-call-for-submissions/</loc></url><url><loc>https://www.sei.cmu.edu/library/annual-technical-meeting-of-csirts-with-national-responsibility-natcsirt/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/authorized-users-of-cert/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/leap4bd-lightweight-evaluation-and-architecture-prototyping-for-big-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/call-for-papers-second-international-workshop-on-software-architecture-and-metrics-sam/</loc></url><url><loc>https://www.sei.cmu.edu/library/call-for-papers-seventh-workshop-on-managing-technical-debt-mtd-2015/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2015-informational-brochure/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2016-sponsorship-opportunities/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-engineering-risk-analysis-sera/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-attendee-code-of-conduct/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2016-sponsorship-opportunities/</loc></url><url><loc>https://www.sei.cmu.edu/library/linda-m-northrop-software-architecture-award-2016/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-technical-debt-in-complex-software-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-secure-coding-in-c-and-c-professional-certificate/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-secure-coding-in-java-professional-certificate/</loc></url><url><loc>https://www.sei.cmu.edu/library/join-our-cybersecurity-team/</loc></url><url><loc>https://www.sei.cmu.edu/library/its-time-to-engage-with-the-cert-division/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2016-informational-brochure/</loc></url><url><loc>https://www.sei.cmu.edu/library/12th-sei-architecture-centric-engineering-workshop-for-educators/</loc></url><url><loc>https://www.sei.cmu.edu/library/manage-cybersecurity-risk-across-the-lifecycle-the-cert-software-assurance-framework-saf-assessment/</loc></url><url><loc>https://www.sei.cmu.edu/library/big-data-learn-to-reap-the-benefits/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2017-sponsorship-opportunities/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-solutions-symposium-2017-sponsorship-opportunities/</loc></url><url><loc>https://www.sei.cmu.edu/library/quelce-cost-estimation-method/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-solutions-symposium-2017/</loc><lastmod>2024-02-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2017-sponsorship-opportunities/</loc></url><url><loc>https://www.sei.cmu.edu/library/ninth-international-workshop-on-managing-technical-debt-call-for-papers/</loc></url><url><loc>https://www.sei.cmu.edu/library/big-data-architectures-and-technologies-sei-training/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-education-and-training-catalog/</loc><lastmod>2026-04-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-evaluation-at-the-sei/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-technical-debt-in-software-systems-sei-training/</loc></url><url><loc>https://www.sei.cmu.edu/library/design-guidelines-and-patterns-for-modern-soa-sei-training/</loc></url><url><loc>https://www.sei.cmu.edu/library/designing-modern-soa-systems-sei-training/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-solutions-symposium-2017-informational-brochure/</loc></url><url><loc>https://www.sei.cmu.edu/library/14th-sei-software-engineering-workshop-for-educators/</loc></url><url><loc>https://www.sei.cmu.edu/library/risk-management-brochure/</loc></url><url><loc>https://www.sei.cmu.edu/library/acquisition-support/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/consulting-on-acquisition-issues-and-needs/</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-professional-certificate/</loc><lastmod>2024-06-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/real-time-extraction-of-heart-rate-from-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/scale-evaluating-source-code-for-adherence-to-secure-coding-standards/</loc><lastmod>2025-05-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-sponsorship-booklet/</loc></url><url><loc>https://www.sei.cmu.edu/library/providing-agile-and-lean-capabilities-for-the-federal-government/</loc><lastmod>2024-06-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/providing-agile-and-lean-capabilities-for-the-federal-government-agile-adoption-coaching/</loc><lastmod>2024-06-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/better-manage-your-supply-chain/</loc><lastmod>2024-04-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/guide-to-the-sei-partner-network/</loc></url><url><loc>https://www.sei.cmu.edu/library/t-check-low-cost-approach-to-technology-evaluation/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-to-renew-cert-resilience-management-model-cert-rmm-lead-appraiser-certification/</loc><lastmod>2024-06-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-to-renew-team-software-process-tsp-credentials/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-seis-cert-division-leaders-in-cybersecurity/</loc></url><url><loc>https://www.sei.cmu.edu/library/natcsirt-2018-sponsorship-guide/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-cybersecurity-engineering-and-software-assurance-professional-certificate/</loc></url><url><loc>https://www.sei.cmu.edu/library/ddos-quick-reference-guide-for-natcsirts/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-building-secure-applications/</loc><lastmod>2024-04-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dod-and-federal-client-support/</loc></url><url><loc>https://www.sei.cmu.edu/library/research-review-2019-schedule/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2020-sponsorship-opportunities/</loc></url><url><loc>https://www.sei.cmu.edu/library/natcsirt-2020-sponsorship-guide/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2020-call-for-submissions/</loc></url><url><loc>https://www.sei.cmu.edu/library/research-services-high-tea-2020/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/booklet-cmu-sei-research-review-2020-research-review-project-summaries/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2020-agenda/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-cybersecurity-awareness-resource-brochure/</loc></url><url><loc>https://www.sei.cmu.edu/library/ai-engineering-an-emergent-discipline-for-human-centered-robust-and-secure-and-scalable-ai/</loc></url><url><loc>https://www.sei.cmu.edu/library/icssp-2022-call-for-papers/</loc></url><url><loc>https://www.sei.cmu.edu/library/computing-at-the-edge-challenges-and-priorities-for-software-engineering-and-ai/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2021-agenda/</loc></url><url><loc>https://www.sei.cmu.edu/library/icssp-2022-industry-call-for-papers/</loc></url><url><loc>https://www.sei.cmu.edu/library/zero-trust-industry-day-schedule/</loc></url><url><loc>https://www.sei.cmu.edu/library/zero-trust-industry-day-request-for-information-rfi/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-kj-method-eliciting-unstated-requirements-at-scale/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-secure-coding-develop-and-deploy-error-free-software/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/executing-devsecops-with-the-software-engineering-institute/</loc><lastmod>2024-04-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/security-quality-requirements-engineering-square-fact-sheet/</loc></url><url><loc>https://www.sei.cmu.edu/library/aadl-and-osate-a-tool-kit-to-support-model-based-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/system-verification-and-validation-with-model-based-engineering-the-architecture-analysis-design-language/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-call-for-submissions/</loc></url><url><loc>https://www.sei.cmu.edu/library/active-reviews-for-intermediate-design-arid/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cost-benefit-analysis-method-cbam/</loc></url><url><loc>https://www.sei.cmu.edu/library/mission-thread-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-sei-quality-attribute-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/reduce-risk-with-architecture-evaluation/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-is-your-definition-of-software-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/attribute-driven-design-create-software-architectures-using-architecturally-significant-requirements/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/views-and-beyond-the-sei-approach-for-architecture-documentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/architectural-coaching/</loc></url><url><loc>https://www.sei.cmu.edu/library/sgmm-partners-and-navigators/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2019-sponsorship-opportunities/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-and-cyber-solutions-symposium-2019-sponsorship-opportunities/</loc></url><url><loc>https://www.sei.cmu.edu/library/advancing-ai-for-defense-and-national-security/</loc><lastmod>2025-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/quantum-computing-for-mission-performant-quantum-computing-at-the-sei/</loc></url><url><loc>https://www.sei.cmu.edu/library/foundry-a-training-asset-management-portal/</loc><lastmod>2024-04-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ghosts-a-framework-for-realistic-npc-orchestration/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/greybox-emulate-the-internet-for-offline-cybersecurity-training/</loc></url><url><loc>https://www.sei.cmu.edu/library/topgen-a-universal-platform-for-web-dns-email-and-more/</loc></url><url><loc>https://www.sei.cmu.edu/library/topomojo-a-vm-topology-manager/</loc></url><url><loc>https://www.sei.cmu.edu/library/vtunnel-hide-administrative-traffic-from-exercise-participants/</loc></url><url><loc>https://www.sei.cmu.edu/library/welle-d-a-wireless-traffic-transport-for-wired-networks/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-intelligence-tradecraft-report-executive-summary/</loc></url><url><loc>https://www.sei.cmu.edu/library/designing-ethical-ai-experiences-checklist-and-agreement/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmcsecuring-the-dib-supply-chain-with-the-cybersecurity-maturity-model-certification-process-10-cmmc-10/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/modeling-system-architectures-using-the-architecture-analysis-and-design-language-aadlelearning/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmc-scoring-fact-sheet-10-cmmc-10/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/crucible-framework-brochure/</loc><lastmod>2026-04-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/octave-forte-establish-a-more-adaptable-and-robust-risk-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/measure-the-effectiveness-of-an-insider-threat-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/protect-your-organization-from-insider-threats/</loc></url><url><loc>https://www.sei.cmu.edu/library/certainty/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-ai-to-reduce-software-improvement-costs/</loc></url><url><loc>https://www.sei.cmu.edu/library/making-software-the-strategic-advantage/</loc><lastmod>2025-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-solutions-division/</loc></url><url><loc>https://www.sei.cmu.edu/library/phite-improved-situational-awareness-through-ai-at-the-edge/</loc><lastmod>2025-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/understanding-software-architecture-quality-and-security-through-code-analysis/</loc><lastmod>2025-01-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-zero-trust-industry-day/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-technical-debt-credit-check/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-technical-debt-identify-technical-debt-items/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-systems-team-utilizing-a-holistic-project-lifecycle-approach/</loc><lastmod>2024-07-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/getting-started-with-acepops/</loc></url><url><loc>https://www.sei.cmu.edu/library/jupytersilk/</loc></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-assurance-creating-justified-confidence/</loc></url><url><loc>https://www.sei.cmu.edu/library/modernizing-government-software-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/scale-evaluating-source-code-for-adherence-to-secure-coding-standards-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/linda-m-northrop-software-architecture-award-nomination-form/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2017-registration-form/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-registration-form/</loc></url><url><loc>https://www.sei.cmu.edu/library/nomination-form-for-the-2018-linda-m-northrop-software-architecture-award/</loc></url><url><loc>https://www.sei.cmu.edu/library/sgmm-compass-assessment-survey-version-20/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/application-for-candidate-sponsorship/</loc><lastmod>2023-11-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/conflict-of-interest-disclosure-form/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-approved-proctor-and-testing-center-application/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-engineering-institute-certification-agreement/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-certified-rmm-lead-appraiser/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-user-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-code-of-professional-conduct-commitment-form-for-individuals/</loc></url><url><loc>https://www.sei.cmu.edu/library/sgmm-navigation-process/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/general-terms-conditions-gtc-section/</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/united-states-government-interagency-agreement-iaa/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/nomination-form-for-the-2019-linda-m-northrop-software-architecture-award/</loc></url><url><loc>https://www.sei.cmu.edu/library/justificiation-of-funds-template/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/html5-at-the-tactical-edge-sei-bulletin/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-and-wireless-emergency-alerts-sei-bulletin/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2015-call-for-participation/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-agile-in-the-dod-sixth-principle-sei-bulletin/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-agile-in-the-dod-seventh-principle-sei-bulletin/</loc></url><url><loc>https://www.sei.cmu.edu/library/systems-engineering-in-defense-and-non-defense-industries/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-for-services-special-edition-of-the-monitor/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-monitor-october-2010/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-monitor-june-2010/</loc></url><url><loc>https://www.sei.cmu.edu/library/architectural-analysis-with-aadl/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-rmm-for-international-mail-transport/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-monitor-may-2010/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-monitor-january-2010/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-monitor-july-2010/</loc></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-third-quarter-2003/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-third-quarter-2002/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-third-quarter-2001/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-summer-2000/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-20041/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-20042/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-20043/</loc><lastmod>2024-01-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-december-1999/</loc><lastmod>2024-01-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-first-quarter-2001/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-spring-2000/</loc><lastmod>2026-04-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-september-1999/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-second-quarter-2003/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-second-quarter-2002/</loc><lastmod>2024-01-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-second-quarter-2001/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-march-2000/</loc><lastmod>2024-01-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-fourth-quarter-2003/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-fourth-quarter-2002/</loc><lastmod>2024-01-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-fourth-quarter-2001/</loc><lastmod>2024-01-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-first-quarter-2003/</loc><lastmod>2024-01-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-first-quarter-2002/</loc><lastmod>2026-04-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-monitor-june-2009/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-monitor-january-2009/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/spin-newsletter-winter-2009/</loc></url><url><loc>https://www.sei.cmu.edu/library/spin-newsletter-summer-2008/</loc></url><url><loc>https://www.sei.cmu.edu/library/spin-newsletter-spring-2008/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/spin-newsletter-fall-2009/</loc></url><url><loc>https://www.sei.cmu.edu/library/spin-newsletter-fall-2008/</loc></url><url><loc>https://www.sei.cmu.edu/library/from-the-monitor-august-2003-ask-the-sei/</loc><lastmod>2023-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-1998-archive/</loc><lastmod>2024-01-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-1999-archive/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-2008-archive/</loc><lastmod>2026-04-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-2005-archive/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-2006-archive/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-2007-archive/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/defect-prioritization-with-the-risk-priority-number-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/dod-renews-sei-contract/</loc></url><url><loc>https://www.sei.cmu.edu/library/kd-cloudlet-software-and-agile-at-scale/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devops-for-contractors/</loc><lastmod>2023-11-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/kd-cloutlet-software/</loc><lastmod>2024-01-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/taxonomy-of-testing-types-and-managing-software-complexity-in-models/</loc></url><url><loc>https://www.sei.cmu.edu/library/aadl-code-generation-for-avionics/</loc></url><url><loc>https://www.sei.cmu.edu/library/context-aware-computing/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-call-for-submissions/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-operational-resilience/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-driven-engineering/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-fault-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/best-osa-practices-sei-bulletin/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/monitoring-sisa-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-assurance-curriculum-and-situational-awareness/</loc></url><url><loc>https://www.sei.cmu.edu/library/grady-booch-and-api-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/devops-pipeline-security-and-northrop-architecture-award-nominations/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-security-in-maturity-model-and-big-data-technology-selection/</loc></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-change-request-flow-chart/</loc></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-quality-attribute-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-the-value-of-high-maturity-to-the-customer/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-messages-from-the-field/</loc></url><url><loc>https://www.sei.cmu.edu/library/news-at-sei-cmmi-version-13plans-for-the-next-version/</loc></url><url><loc>https://www.sei.cmu.edu/library/is-java-more-secure-than-c-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-rmm-version-12-released/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/octobernovember-2014-edition-of-the-secure-coding-newsletter/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/decemberjanuary-2015-edition-of-the-secure-coding-newsletter/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/februarymarch-2015-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/mayjune-2015-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/octobernovember-2015-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/winter-2015-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/februarymarch-2016-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/hayes-testifies-on-agile-in-ssa-modernization-open-source-tool-for-fault-tree-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-and-new-nispom-requirements/</loc></url><url><loc>https://www.sei.cmu.edu/library/air-force-intelligence-and-agile/</loc></url><url><loc>https://www.sei.cmu.edu/library/air-force-intel-and-agile/</loc><lastmod>2024-03-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/when-is-a-vulnerability-a-safety-issue/</loc></url><url><loc>https://www.sei.cmu.edu/library/10-at-risk-emerging-technologies-2/</loc><lastmod>2024-02-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/is-your-organization-ready-for-agile/</loc></url><url><loc>https://www.sei.cmu.edu/library/dynamic-defense-technologies/</loc><lastmod>2024-02-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/learning-from-ant-colonies-efficient-and-effective-sustainment/</loc></url><url><loc>https://www.sei.cmu.edu/library/coordinated-vulnerability-disclosure/</loc><lastmod>2024-07-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/watts-humphey-awards-and-vul-detection-with-technical-debt/</loc></url><url><loc>https://www.sei.cmu.edu/library/high-school-students-get-crash-course-in-cyber-kinetic-tactical-operations/</loc></url><url><loc>https://www.sei.cmu.edu/library/founding-cert-director-richard-pethia-retires/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/traffic-analysis-for-network-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-netflow-still-matters/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-intelligence-research-consortium/</loc><lastmod>2024-06-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/verifying-distributed-adaptive-real-time-systems-2/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/fall-2016-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-code-repair-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-technical-history-of-the-sei-2/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/why-did-the-robot-do-that-machine-learning/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2017-and-it-sabotage/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-solutions-symposium/</loc></url><url><loc>https://www.sei.cmu.edu/library/spring-2017-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/updated-insider-threat-guidebook-and-scaling-agile/</loc><lastmod>2024-04-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/educators-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/watson-and-software-assurance/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cert-division-and-state-department-team-up-on-sub-saharan-cybersecurity-effort/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-c-standard-freely-available-and-the-best-practices-for-ntp/</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/chief-risk-officer-certificate-and-distributed-ai-in-space/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-analytics-for-network-flow-records/</loc></url><url><loc>https://www.sei.cmu.edu/library/ransomware-prevention-and-response/</loc><lastmod>2024-07-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/army-robotics-and-flocon-2018/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/malware-defense-and-ntp-best-practices/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/latest-sei-research-and-data-management-and-event-correlation/</loc><lastmod>2024-06-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/bitcoin-and-blockchain/</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/summer-2017-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/real-time-extraction-of-biometric-data-from-video/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-guide-to-coordinated-vulnerability-disclosure/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-releases-updated-reverse-engineering-tool-on-github/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ibm-watson-for-software-assurance/</loc><lastmod>2024-08-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-call-for-submissions-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/2017-emerging-technology-domains-risk-survey-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/fall-2017-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/northrop-award-is-software-spoiling-us/</loc></url><url><loc>https://www.sei.cmu.edu/library/new-sei-website/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-to-host-15th-software-engineering-workshop-for-educators/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-resilience-review-hipaa-mapping-arming-the-analyst/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-preview-combating-acquisition-costs/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-and-devops-hybrid-threat-modeling/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/system-architecture-virtual-integration-nets-significant-savings/</loc><lastmod>2024-07-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/three-software-innovations-that-dod-needs-now/</loc><lastmod>2024-06-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/big-data-malware-infrastructure-as-code/</loc><lastmod>2024-06-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/deep-learning-in-depth-new-silk-tools-release-sei-events-sei-training-opportunities/</loc><lastmod>2024-07-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/jump-starting-an-insider-threat-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/runtime-assurance-in-cyber-physical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/summer-2018-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-does-software-cost-so-much-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-role-of-the-software-factory-in-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/our-latest-on-blockchain-a-more-secure-programming-language-and-next-steps/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-to-be-a-network-traffic-analyst-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/threat-modeling-for-cyber-physical-system-of-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/new-cert-tool-speeds-artifact-extraction/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/best-practices-for-security-in-cloud-computing-2/</loc><lastmod>2024-04-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/institute-names-new-cto/</loc></url><url><loc>https://www.sei.cmu.edu/library/boosting-cybersecurity-with-devops/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-warfare-exercise-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/dod-developers-guidebook-for-software-assurance-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/new-sei-software-secures-iot-in-edge-environments/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/deep-learning-and-satellite-imagery-diux-xview-challenge/</loc></url><url><loc>https://www.sei.cmu.edu/library/leading-in-the-age-of-artificial-intelligence-2/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-division-releases-six-free-cyber-simulation-tools/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-launches-women-in-software-cybersecurity-podcast-series/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/managing-technical-debt-a-focus-on-automation-design-and-architecture-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-division-releases-sixth-edition-of-common-sense-guide-to-mitigating-insider-threats/</loc></url><url><loc>https://www.sei.cmu.edu/library/seis-cert-division-to-host-national-insider-threat-center-nitc-symposium-2019/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/new-sei-book-on-managing-technical-debt/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-intelligence-report-outlines-best-practices-and-biggest-challenges/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-artificial-intelligence-can-discover-hidden-flaws-in-code/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2020-registration-opens/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devops-in-highly-regulated-environments-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/12-risks-and-4-best-practices-for-moving-to-the-cloud-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2023-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-promise-of-deep-learning-on-graphs-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dod-tech-leaders-to-address-cloud-computing-at-scss-2019-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-supports-national-insider-threat-awareness-month-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ai-engineering-practices-for-decision-makers-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-supports-national-cybersecurity-awareness-month-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2024-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-staff-elected-to-ieee-computer-society-leadership-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-conference-on-software-architecture-opens-call-for-submissions-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-team-wins-2019-isla-award-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-blog-seeks-user-feedback-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/blog-posts-highlight-ai-engineering-machine-learning-cybersecurity-guidance-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2024-08-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/stempfleys-testimony-on-telecom-supply-chain-informs-congressional-report-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cto-tom-longstaff-talks-ai-engineering-at-the-sei-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/challenging-the-myth-of-the-x10-programmer-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2020-announces-program-and-speakers-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/nominations-for-ieeesei-watts-s-humphrey-spa-award-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/trusted-data-meaningful-metrics-in-cybersecurity-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-introduction-to-the-cybersecurity-maturity-model-certification-cmmc-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-in-highly-regulated-environments-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/designing-trustworthy-ai-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/get-software-development-time-back-on-your-side-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-future-of-cybercrime-and-election-security-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2021-invites-abstracts-on-using-data-to-defend-news-and-events-sei-training-opportunities-sei-jobs/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2019-sei-year-in-review-highlights-accomplishments-in-ai-data-analysis-and-more/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-contract-extended-by-department-of-defense-for-27-billion/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-engineering-workshop-for-educators-opens-registration/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/building-the-cybersecurity-maturity-model-certification-10-cmmc-10/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/kalki-iot-security-platform-released/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-symposium-to-explore-insider-risk-management/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/educators-school-up-on-cutting-edge-software-engineering-and-pandemic-teaching/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-division-research-supports-national-cybersecurity-awareness-month/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-to-lead-national-ai-engineering-initiative/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-releases-software-engineering-measurement-and-analysis-course-materials/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ai-engineering-report-highlights-needs-and-challenges-to-focus-emerging-discipline/</loc><lastmod>2024-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2020-research-review-showcases-the-seis-fundamental-research/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2021-announces-program-on-using-data-to-defend/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/new-sei-podcasts-dive-deep-into-cmmc-assessment-guides/</loc><lastmod>2024-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-new-cybersecurity-landscape-of-remote-work/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/six-key-cybersecurity-engineering-activities-for-building-a-cybersecurity-strategy/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-software-product-lines-course-materials-now-freely-available/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/new-sei-paper-and-blog-post-break-down-the-cmmc-assessment-guides-10-cmmc-10/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-devsecops-enables-digital-engineering/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-current-state-of-devsecops-metrics/</loc><lastmod>2024-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/webcast-to-launch-national-ai-engineering-initiative-and-invite-partnership/</loc><lastmod>2024-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/former-federal-ciso-touhill-named-new-director-of-cmu-sei-cert-division/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-pittsburgh-2021-opens-registration/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ransomware-research-offers-analysis-and-defense-strategies/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-maps-out-cybersecurity-for-world-economic-forum/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-conference-delivers-practitioner-insights/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-establishes-ai-division-introduces-ai-engineering-pillars/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2022-opens-call-for-abstracts-on-data-driven-security/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-la-call-for-speakers-closes-august-9/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/benefits-and-applications-of-zero-trust-adoption/</loc><lastmod>2023-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/symposium-and-webcast-to-explore-insider-risk-management/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/registration-opens-for-2021-sei-research-review/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-supports-cybersecurity-awareness-month/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-ai-division-calls-for-participation-in-aaai-symposium/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2022-opens-registration/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecting-the-future-of-software-engineering/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2021-sei-research-review-materials-available/</loc><lastmod>2023-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-coauthors-responsible-ai-guidelines/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2022-announces-speakers-and-trainings/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/explainable-ai-explained-2/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/envisioning-the-future-of-software-engineering-2/</loc><lastmod>2024-01-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automating-reverse-engineering-and-malware-analysis/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/securing-the-supply-chain-for-the-defense-industrial-base-2/</loc><lastmod>2024-07-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-and-systems-collaboration-in-the-era-of-smart-systems-2/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/technical-debt-paper-by-sei-authors-wins-most-influential-award/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-pittsburgh-2022-program-announced/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/six-dimensions-of-trust-in-autonomous-systems/</loc><lastmod>2024-01-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/international-conference-on-software-and-systems-processes-begins-may-19/</loc><lastmod>2024-04-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/symposium-delivers-new-perspectives-on-ai-engineering/</loc><lastmod>2023-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/new-model-provides-blueprint-for-devsecops/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-offers-ai-workforce-development-trainings/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/zero-trust-journey-blazes-a-trail/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2023-opens-call-for-participation/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/humphrey-software-quality-award-nominations-open/</loc><lastmod>2024-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-engineering-institute-to-host-zero-trust-industry-days/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insider-risk-management-symposium-returns-september-7-8/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/new-edition-of-insider-threat-guide-released/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-webcasts-support-cybersecurity-awareness-month/</loc><lastmod>2024-07-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2023-registration-opens-for-january-in-person-event/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2022-research-review-to-show-the-sei-forging-the-path/</loc><lastmod>2024-01-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-platform-independent-model-receives-major-update/</loc><lastmod>2024-01-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2022-research-review-videos-and-presentations-available/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/blog-post-demystifies-enterprise-technical-debt/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ishpi-ais-division-to-receive-ieee-cssei-humphrey-software-quality-award/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/top-ten-sei-blog-posts-of-2022/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/rust-security-explored/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/new-tool-detects-mismatches-in-machine-learning-system-development/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-in-c-and-c-version-collection/</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-certificate-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2009-proceedings-and-presentations/</loc><lastmod>2023-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/agile-in-the-dod-podcast-series/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2008-proceedings-and-presentations/</loc><lastmod>2023-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2007-presentations/</loc><lastmod>2023-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2006-presentations/</loc><lastmod>2023-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2013-proceedings-and-presentations/</loc><lastmod>2023-11-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/wireless-emergency-alerts-podcast-series/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2012-proceedings-and-presentations/</loc><lastmod>2023-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2011-proceedings-and-presentations/</loc><lastmod>2023-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2010-proceedings-and-presentations/</loc><lastmod>2023-11-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-presentations-and-proceedings-2006-present/</loc></url><url><loc>https://www.sei.cmu.edu/library/2013-ijsse-special-issue-on-cybersecurity-scientific-validation/</loc></url><url><loc>https://www.sei.cmu.edu/library/2010-ijsse-special-issue-on-software-security-engineering-education/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/competency-development-and-workforce-readiness/</loc></url><url><loc>https://www.sei.cmu.edu/library/smart-grid-assets/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/resilience-management-related-assets/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-rmm-related-assets/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/octave-related-assets/</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-capability-maturity-model-related-assets/</loc><lastmod>2025-11-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-rmm-webinar-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-rmm-and-the-us-postal-service-usps/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2014-proceedings-and-presentations/</loc><lastmod>2023-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2015-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/resilience-measurement-and-analysis-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-ieee-cybersecurity-initiative-accelerating-innovation-in-security-privacy-technologies/</loc><lastmod>2023-11-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2009-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2014-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2008-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2006-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2013-collection/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2012-collection/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2005-collection/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2011-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2010-collection/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2004-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-2015-research-review-artifacts/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-solutions-conference-ssc-2015-presentations/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2016-presentations/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyburgh-pa-2016-presentations-videos-and-artifacts/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-analysis-design-language-aadl-sei-resources/</loc><lastmod>2024-07-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-newsletter-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/special-issue-on-insider-threat-modeling-and-simulation/</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-book-series-in-software-engineering/</loc><lastmod>2024-02-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-secure-coding-books/</loc><lastmod>2024-02-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2016-secure-coding-symposium-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/scale-collection/</loc><lastmod>2025-05-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-2016-research-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/quality-attribute-workshop-collection/</loc><lastmod>2024-08-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-faa-research-project-effects-of-system-complexity-on-aircraft-safety/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/agile-architecting-collection/</loc><lastmod>2023-10-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/context-based-technology-evaluation-collection/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-wireless-emergency-alerts-project-collection/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cybercrime-survey-collection/</loc><lastmod>2025-10-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/attribute-driven-design-method-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/views-and-beyond-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-malware-analysis-in-security-requirements-elicitation/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-quality-requirements-engineering-square/</loc></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-engineering-research-security-quality-requirements-engineering-square-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-engineering-research-malware-analysis-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-engineering-research-supply-chain-and-commercial-off-the-shelf-cots-assurance-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-engineering-research-security-engineering-risk-analysis-sera-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-engineering-research-cybersecurity-quality-metrics-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-engineering-research-software-assurance-measurement-and-analysis-collection/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-engineering-research-software-assurance-ecosystem-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-engineering-research-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-and-ontology-resources/</loc></url><url><loc>https://www.sei.cmu.edu/library/resources-for-collecting-evidence-and-forensics/</loc></url><url><loc>https://www.sei.cmu.edu/library/resources-for-creating-a-csirt/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cyber-minute/</loc><lastmod>2024-08-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/agile-adoption-in-government-podcast-series/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-community-of-practice-workshop-2016/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-cert-c-and-c-coding-standards/</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-solutions-symposium-2017-presentations/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2017-presentations/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/learning-about-agile-in-government-settings/</loc></url><url><loc>https://www.sei.cmu.edu/library/finding-your-way-in-devops/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-data-science-and-cybersecurity-symposium/</loc></url><url><loc>https://www.sei.cmu.edu/library/supplementary-materials-for-software-assurance-curricula/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/implementing-the-software-assurance-curricula/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/incident-management-resources/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/csirt-resources/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/natcsirt-resources/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-engineering-and-information-assurance-a-primer/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-situational-awareness-best-practices/</loc></url><url><loc>https://www.sei.cmu.edu/library/four-secure-coding-publications/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-2017-research-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/acquisition-and-management-concerns-for-agile-use-in-government-series/</loc></url><url><loc>https://www.sei.cmu.edu/library/2017-sei-year-in-review-resources/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-tools-and-advancements-publications/</loc></url><url><loc>https://www.sei.cmu.edu/library/case-studies-in-software-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/architectural-technical-debt-library/</loc></url><url><loc>https://www.sei.cmu.edu/library/resources-for-assurance-cases/</loc><lastmod>2024-05-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-competence-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-engineering-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-advisories-1988-2004/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/patterns-of-failure-acquisition-archetypes/</loc></url><url><loc>https://www.sei.cmu.edu/library/team-software-process-tsp-tools/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2018-presentations/</loc></url><url><loc>https://www.sei.cmu.edu/library/smart-grid-maturity-model-assets-collection-version-12/</loc><lastmod>2023-10-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mission-thread-workshop-2/</loc><lastmod>2024-08-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-intelligence-research-consortium-2/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/reasoning-about-software-quality-attributes/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-product-lines-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/service-oriented-architecture-information-center/</loc></url><url><loc>https://www.sei.cmu.edu/library/resources-developing-software-reliant-systems-faster/</loc></url><url><loc>https://www.sei.cmu.edu/library/measurement-and-analysis-case-studies/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-business-case-for-systems-engineering-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-investment-model-for-sustainment/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-tradeoff-analysis-method-collection/</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-architectures-and-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/state-of-the-measurement-and-analysis-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/getting-started-with-software-measurement-and-analysis/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/operating-and-staffing-a-csirt/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-resilience-management-model-cert-rmm-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/second-international-workshop-on-managing-technical-debt-collection/</loc><lastmod>2023-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/third-international-workshop-on-managing-technical-debt-collection/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/fourth-international-workshop-on-managing-technical-debt-collection/</loc><lastmod>2023-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/fifth-international-workshop-on-managing-technical-debt-collection/</loc><lastmod>2023-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ninth-international-workshop-on-managing-technical-debt-collection/</loc><lastmod>2023-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-and-cyber-solutions-symposium-2018-agile-and-devops/</loc></url><url><loc>https://www.sei.cmu.edu/library/first-sei-software-architecture-workshop-for-educators/</loc></url><url><loc>https://www.sei.cmu.edu/library/sgmm-model-survey-and-overview-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/sgmm-navigation-process-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-2018-research-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/team-software-process-tsp-and-personal-software-process-psp-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2019-presentations/</loc></url><url><loc>https://www.sei.cmu.edu/library/psp-for-the-21st-century/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-and-cyber-solutions-symposium-2019-acquisition-security-and-the-supply-chain/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2019-presentations/</loc><lastmod>2023-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-intelligence-tradecraft-report-the-state-of-cyber-intelligence-practices-in-the-united-states-study-report-and-implementation-guides/</loc></url><url><loc>https://www.sei.cmu.edu/library/netsa-tools/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-innovation-snapshots/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-devops-collection-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-collection/</loc><lastmod>2024-10-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-led-incremental-system-assurance-alisa-tutorial/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-data-science-in-cybersecurity-symposium-2018-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-simulator-showcase-presentation-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/fact-sheets-of-cwd-tools-for-improving-cyber-simulations/</loc><lastmod>2024-04-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/videos-of-cwd-tools-for-improving-cyber-simulations/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-and-cyber-solutions-symposium-2019-benefits-and-risks-of-cloud-computing/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2019/</loc></url><url><loc>https://www.sei.cmu.edu/library/aadl-user-day-2019/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-and-cyber-solutions-symposium-past-presentations/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threats-during-pandemic-conditions/</loc></url><url><loc>https://www.sei.cmu.edu/library/2019-sei-year-in-review-resources/</loc><lastmod>2026-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ghosts-software-and-supporting-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/vtunnel-software-and-supporting-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/topomojo-software-and-supporting-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/topgen-software-and-supporting-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/welle-d-software-and-supporting-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/greybox-software-and-supporting-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/foundry-software-and-supporting-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/cwd-tools-for-improving-cyber-simulations/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/crucible-software-and-supporting-materials/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-washington-dc-2021/</loc></url><url><loc>https://www.sei.cmu.edu/library/spiral-aiml-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/graph-convolutional-neural-networks-gcnn-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphssei-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphblas-forum-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2020-presentations/</loc></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-maturity-model-certification-10-cmmc-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/sema-course-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-dc-2020/</loc></url><url><loc>https://www.sei.cmu.edu/library/mission-based-prioritization-tool/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2020-day-1-artifacts/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2020-day-2-artifacts/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2020-day-3-artifacts/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2020-day-4-artifacts/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2020-artifacts/</loc></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-pittsburgh-2020/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-product-lines-curriculum/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-maturity-model-certification-podcast-collection-10-cmmc-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/emerging-technologies-2020/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2020-presentation-videos/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-dc-2020-graphic-recordings/</loc></url><url><loc>https://www.sei.cmu.edu/library/early-analysis-of-software-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/aadlacvip-user-days-2021/</loc></url><url><loc>https://www.sei.cmu.edu/library/ai-engineering-assets/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-pittsburgh-2021/</loc></url><url><loc>https://www.sei.cmu.edu/library/pillars-of-ai-engineering-assets/</loc></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-pittsburgh-2021-graphic-recordings/</loc></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-los-angeles-2021/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2021-presentations-and-courses/</loc></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-los-angeles-2021-graphic-recordings/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2021-preview-videos/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2021/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2021-day-1-artifacts/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2021-day-2-artifacts/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2021-day-3-artifacts/</loc></url><url><loc>https://www.sei.cmu.edu/library/untangling-the-knot-enabling-rapid-software-architecture-evolution/</loc><lastmod>2024-12-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-washington-dc-2021-graphic-recordings/</loc></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-pittsburgh-2022/</loc></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-pittsburgh-2022-graphic-recordings/</loc></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-aaai-spring-symposium-on-ai-engineering-2022/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/aadlacvip-user-day-2022/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2022-assets/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-zero-trust-industry-day-2022/</loc></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-washington-dc-2022/</loc></url><url><loc>https://www.sei.cmu.edu/library/zero-trust-collection/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2022-preview-videos/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2022/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2022-day-1-artifacts/</loc></url><url><loc>https://www.sei.cmu.edu/library/deepfakes-day-2022/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2022-day-2-artifacts/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2022-day-3-artifacts/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2023-assets/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-appraisal-results/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-for-services-2008-webinar/</loc></url><url><loc>https://www.sei.cmu.edu/library/sepg-conference-series-overview/</loc><lastmod>2026-01-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-level-2-for-practitioners-a-focused-course-for-your-level-2-efforts/</loc></url><url><loc>https://www.sei.cmu.edu/library/evolution-of-a-software-engineer-in-a-sos-system-engineering-world/</loc></url><url><loc>https://www.sei.cmu.edu/library/open-systems-whats-old-is-new-again/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-process-improvement-in-stealth-mode-is-it-ideal/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-innovative-requirements-solution-combining-six-sigma-kj-language-data-analysis-with-automated-content-analysis/</loc><lastmod>2024-08-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-modeling-the-key-to-managing-acquisition-complexity/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tips-for-organizations-working-together-at-different-maturity-levels-sepg-2007/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/achieving-quality-requirements-with-reused-software-components-challenges-to-successful-reuse/</loc></url><url><loc>https://www.sei.cmu.edu/library/defined-processes-evidence-and-rescuing-corporate-knowledge-achieving-standards-compliance-in-agile-and-lean-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/acquiring-evolving-technologies-web-services-standards-2/</loc><lastmod>2024-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-acquisition-best-practices-2004-edition/</loc></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-architecture-and-tspr-contractor-model/</loc></url><url><loc>https://www.sei.cmu.edu/library/advanced-risk-analysis-for-high-performing-organizations/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-process-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/experience-with-the-architecture-improvement-workshop-saturn-2009/</loc></url><url><loc>https://www.sei.cmu.edu/library/they-keep-moving-the-cheese/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/guidelines-for-acquisition-planning-january-2004/</loc></url><url><loc>https://www.sei.cmu.edu/library/aligning-cmmi-implementation-and-organizational-strategy-for-better-competitive-advantages/</loc></url><url><loc>https://www.sei.cmu.edu/library/sa-cmm-in-a-large-complex-program/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/applying-cmmi-for-services-to-health-care/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/applying-cmmi-svc-process-areas-to-cmmi-dev-projects/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-the-team-software-process/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architectural-aspects-of-long-lived-ground-systems-2006/</loc></url><url><loc>https://www.sei.cmu.edu/library/methodical-design-of-software-architecture-using-an-architecture-design-assistant-arche/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-design-expert-saturn-2005/</loc></url><url><loc>https://www.sei.cmu.edu/library/going-global-a-practical-guide-to-implementing-process-improvement-across-six-continents/</loc><lastmod>2026-01-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-system-archetypes-to-identify-failure-patterns-in-acquisition/</loc><lastmod>2024-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architectural-evolution-saturn-2006/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-for-ultra-large-scale-uls-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-and-design/</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-evolution-working-session-saturn-2006/</loc><lastmod>2024-04-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-importance-of-software-architecture-in-the-acquisition-process/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/transforming-an-agency-in-an-interagency-environment/</loc><lastmod>2024-06-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/iterative-rfp-project-management/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/army-software-product-line-workshop-spl-overview/</loc></url><url><loc>https://www.sei.cmu.edu/library/asap-applying-services-cmmi-svc-and-people-cmm/</loc></url><url><loc>https://www.sei.cmu.edu/library/designing-software-architecture-to-achieve-business-goals/</loc></url><url><loc>https://www.sei.cmu.edu/library/acquisition-support-helping-programs-succeed-2007/</loc><lastmod>2024-04-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-software-product-line-adoption/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-support-program-overview/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-impact-of-conducting-atam-evaluations-on-army-programs-saturn-2009/</loc></url><url><loc>https://www.sei.cmu.edu/library/assurance-cases-for-design-analysis-of-complex-system-of-systems-software-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/assuring-mission-success-in-complex-settings/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-product-lines-reuse-that-makes-business-sense/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-session-summary-use-of-the-sei-atam-in-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/attracting-investment-in-process-improvement-through-strategic-positioning/</loc><lastmod>2023-11-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/experience-and-lessons-learned-in-applying-the-tri-service-assessment-initiative-process/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/status-of-ongoing-work-in-software-trastrls/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/best-of-everything-itil-cmmi-and-lean-six-sigma/</loc></url><url><loc>https://www.sei.cmu.edu/library/combining-product-line-engineering-and-service-oriented-architecture-in-health-care-infrastructure-systems-experience-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/risk-themes-from-atam-data-preliminary-results/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-and-integrated-product-and-process-development-ippd-version-102/</loc></url><url><loc>https://www.sei.cmu.edu/library/quicker-and-better-quality-improvement-business-cases-with-bayesian-belief-networks-and-six-sigma/</loc></url><url><loc>https://www.sei.cmu.edu/library/10-proven-principles-for-process-improvement-and-organizational-success/</loc></url><url><loc>https://www.sei.cmu.edu/library/twelve-proven-principles-for-process-improvement-and-organizational-success/</loc><lastmod>2024-06-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/effectively-deploying-cmmi-in-a-large-organization/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-level-3-in-a-large-multi-disciplinary-services-organization/</loc><lastmod>2024-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/lessons-learned-on-cooperative-government-industry-appraisals/</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/integrating-software-architecture-evaluation-in-a-dod-system-acquisition/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/reducing-system-acquisition-risk-with-software-architecture-analysis-and-evaluation/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/painless-transition-from-sw-cmm-level-2-to-cmmi-level-3/</loc></url><url><loc>https://www.sei.cmu.edu/library/best-practices-in-software-architecture-2/</loc><lastmod>2024-01-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/beyond-cmmi-sesw-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/beyond-ippd-distributed-collaboration-in-a-systems-of-systems-sos-context/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/virtua-health/</loc><lastmod>2024-06-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/complex-systems-of-systems-csos-software-benefits-risks-and-strategies/</loc></url><url><loc>https://www.sei.cmu.edu/library/early-warning-indicators-in-the-acquisition-of-software-intensive-systems/</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/business-process-lines-to-develop-service-oriented-architectures-through-the-software-product-lines-paradigm/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/keynote-address-conference-on-the-acquisition-of-software-intensive-systems/</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/navair-software-acquisition-improvement/</loc><lastmod>2024-06-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-design-with-arche/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-proof-is-in-the-project-combining-personal-and-team-process-with-cmmi-level-5/</loc></url><url><loc>https://www.sei.cmu.edu/library/smart-at-model-dumb-at-change/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/getting-from-here-sw-cmm-to-there-cmmi-in-a-large-organization/</loc></url><url><loc>https://www.sei.cmu.edu/library/bridging-the-gap-between-cmmi-and-six-sigma-training-an-overview-and-case-study-of-performance-driven-process-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-a-software-architecture-community-saturn-2006/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-organizational-business-objectives-to-guide-a-process-improvement-program/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/strategies-for-implementing-the-cmmi-project-management-process-category/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-product-lines-in-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/reconsidering-the-role-of-systems-engineering-in-dod-software-problems/</loc></url><url><loc>https://www.sei.cmu.edu/library/renewing-the-product-line-vision/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-first-cmmi-based-appraisal-in-an-agile-enviroment-at-siemens-ag/</loc><lastmod>2024-02-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-engineering-institute-acquisition-support-program-architecture-product-update/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/getting-more-out-of-your-inspection-data-using-capture-recapture-models-for-the-reinspection-decision/</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/strategies-for-transitioning-from-sw-cmm-to-cmmi/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-architecture-centric-engineering-on-a-tsp-project/</loc></url><url><loc>https://www.sei.cmu.edu/library/career-track-for-architects-in-it-organizations-saturn-2009/</loc></url><url><loc>https://www.sei.cmu.edu/library/special-intelligence-from-the-women-in-black/</loc></url><url><loc>https://www.sei.cmu.edu/library/special-intelligence-from-the-women-in-black-sepg-europe-2005/</loc></url><url><loc>https://www.sei.cmu.edu/library/improving-acquisition-through-cots-risk-identification/</loc></url><url><loc>https://www.sei.cmu.edu/library/experiences-with-indicator-based-appraisals-lockheed-martin-continuous-appraisal-method-cam/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-systems-thinking-approach-to-building-and-updating-c4isr-architecture-views/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-business-case-for-requirements-engineering/</loc><lastmod>2024-02-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/assessing-the-economic-impacts-of-architectural-decisions/</loc></url><url><loc>https://www.sei.cmu.edu/library/ccl-in-pictures/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/accelerating-cmmi-implementation-with-psp-and-tsp-in-a-small-organization/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-staged-or-continuous/</loc></url><url><loc>https://www.sei.cmu.edu/library/application-of-the-cert-resilience-management-model-at-lockheed-martin/</loc></url><url><loc>https://www.sei.cmu.edu/library/tri-service-assessment-initiative-phase-2-systemic-analysis-results/</loc><lastmod>2023-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/there-is-a-method-to-this-madness-transforming-appraisal-findings-into-a-process-improvement-plan/</loc></url><url><loc>https://www.sei.cmu.edu/library/is-there-order-or-chaos-after-5000/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/assorted-chocolates-and-cookies-in-a-multi-model-box/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/improving-software-architecture-competence-saturn-2007/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-the-dod-perspective/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/planning-a-combined-cmmi-and-as9100-appraisal/</loc><lastmod>2024-01-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/benefits-of-cmmi-within-the-defense-industry/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-for-services-agile-strategy/</loc><lastmod>2024-01-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-for-services-overview/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-itil-and-iso-20000-a-mutually-supportive-relationship/</loc><lastmod>2024-04-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-maturity-level-2-a-foundation-for-large-scale-agile-development/</loc><lastmod>2024-02-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-impact-august-2009/</loc></url><url><loc>https://www.sei.cmu.edu/library/capability-maturity-model-integration-cmmi-version-12-overview/</loc></url><url><loc>https://www.sei.cmu.edu/library/august-2004-cmmi-performance-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/march-2004-cmmi-performance-results/</loc><lastmod>2024-04-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/march-2005-cmmi-performance-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/march-2006-cmmi-performance-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/march-2007-cmmi-performance-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/march-2008-cmmi-performance-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/march-2009-cmmi-performance-results/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/september-2005-cmmi-performance-results/</loc><lastmod>2024-01-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/september-2006-cmmi-performance-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/september-2007-cmmi-performance-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/september-2008-cmmi-performance-results/</loc><lastmod>2023-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-for-services-cmmi-svc-overview-for-workshop/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-last-phase-of-process-change-deployment/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-version-12-and-beyond/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/why-isnt-someone-coding-yet-wiscy/</loc></url><url><loc>https://www.sei.cmu.edu/library/product-line-acquisition-and-measurement-at-nuwc/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-comfort-reasoning-framework-2/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/systems-engineering-complexity-project-management/</loc><lastmod>2024-02-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/future-trends-of-software-technology-and-applications-software-architecture/</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tips-for-the-process-lead-and-cohorts/</loc><lastmod>2024-07-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/conducting-effective-pilot-studies/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/practical-process-improvement-the-journey-and-benefits/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/contracting-blues-cmmi-acq-clues/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sustaining-software-intensive-systems-a-conundrum/</loc><lastmod>2024-02-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sustaining-software-intensive-systems-a-conundrum-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-sustainability-and-acquisition-reform-a-view-from-the-bottom/</loc><lastmod>2023-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-integration-cost-driver-research/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-cost-model-for-software-system-families/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sema-course-overview/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/achieving-product-qualities-through-software-architecture-practices/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/lets-teach-architecting-high-quality-software/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/coordinating-process-improvement-in-multiple-geographically-dispersed-development-organizations-using-cmmi/</loc></url><url><loc>https://www.sei.cmu.edu/library/agilecmmi-process-innovation-at-the-speed-of-life/</loc><lastmod>2024-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/notes-from-the-blogosphere/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-best-practices-clearinghouse/</loc><lastmod>2023-12-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-acquisition-best-practices-workshop-january-2004/</loc></url><url><loc>https://www.sei.cmu.edu/library/data-analysis-dynamics/</loc><lastmod>2024-02-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-good-is-the-software-a-review-of-defect-prediction-techniques/</loc><lastmod>2024-01-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-level-4-preparation-the-story-of-the-chicken-and-the-egg/</loc></url><url><loc>https://www.sei.cmu.edu/library/developing-enterprise-wide-measures-for-tracking-performance-of-acquisition-organizations/</loc><lastmod>2023-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-cmmi-dev-and-cmmi-svc-together/</loc></url><url><loc>https://www.sei.cmu.edu/library/diagnostic-software-what-your-developer-doesnt-know/</loc></url><url><loc>https://www.sei.cmu.edu/library/diamond-software-product-family-product-centered-organization-pco/</loc></url><url><loc>https://www.sei.cmu.edu/library/equalite-quality-assessment-of-software-suppliers/</loc><lastmod>2023-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/suppliers-perspective-on-cmmi-acq/</loc></url><url><loc>https://www.sei.cmu.edu/library/doing-cmmi-the-agile-way/</loc><lastmod>2024-01-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/feature-based-design-of-web-service-transaction-compensations/</loc></url><url><loc>https://www.sei.cmu.edu/library/standard-cmmi-assessment-method-for-process-improvement-scampi-current-status-and-plans/</loc><lastmod>2024-01-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/applying-cmmi-generic-practices-with-good-judgment/</loc></url><url><loc>https://www.sei.cmu.edu/library/acquisition-pilot-the-application-of-oar-in-a-lead-system-integrator-context/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/agilelean-development-and-cmmi/</loc></url><url><loc>https://www.sei.cmu.edu/library/independent-integrated-verification-and-validation/</loc><lastmod>2023-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-software-architecture-workshop-for-educators/</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/arche-an-architecture-design-assistant/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-software-architecture-workshop-for-educators-presentation/</loc><lastmod>2024-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-effects-of-cmmi-on-program-performance/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/advanced-engineering-environments-for-small-manufacturing-enterprises/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/engineering-safety-related-requirements-for-software-intensive-systems-sepg-2006/</loc></url><url><loc>https://www.sei.cmu.edu/library/engineering-safety-and-security-related-requirements-for-software-intensive-systems-sepg-2006/</loc></url><url><loc>https://www.sei.cmu.edu/library/engineering-safety-and-security-related-requirements-for-software-intensive-systems-iccbss-2007/</loc><lastmod>2024-04-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measuring-software-product-quality-the-iso-25000-series-and-cmmi/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/adopting-software-product-lines-getting-leverage-from-your-process-improvement/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-acquisition-best-practices-experiences-from-the-space-system-domain/</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/evaluating-a-service-oriented-architecture-2/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-executive-overview/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/exploring-the-architecture-of-ultra-large-scale-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/improving-the-management-of-the-software-acquisition-process-a-methodological-approach-in-automotive/</loc><lastmod>2023-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/experiences-with-leveraging-six-sigma-to-implement-cmmi-levels-4-and-5/</loc></url><url><loc>https://www.sei.cmu.edu/library/first-steps-in-implementing-the-cmmi-for-services-model-and-itil/</loc></url><url><loc>https://www.sei.cmu.edu/library/meeting-the-challenges-of-ultra-large-scale-systems-via-model-driven-engineering/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/requirements-for-a-software-chief-engineer-for-a-weapons-systems-acquisition/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-level-5-return-on-investment-for-raytheon-n-tx/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-best-practices-survey-of-the-rail-road-industry/</loc><lastmod>2024-03-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-acquisition-model-driving-process-improvement/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/computational-emergence-research-area/</loc><lastmod>2024-01-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mission-thread-workshops-lessons-learned-in-end-to-end-capability-and-quality-attribute-specification-for-sos-architecture-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/mission-thread-workshops-lessons-learned/</loc></url><url><loc>https://www.sei.cmu.edu/library/service-level-agreements-an-approach-to-software-life-cycle-quality/</loc><lastmod>2023-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-rational-unified-process-and-the-capability-maturity-model-integrated-systemssoftware-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/identifying-acquisition-patterns-of-failure-using-systems-archetypes/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-the-cmmi-in-acquisition-environments/</loc><lastmod>2023-12-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/accelerating-the-adoption-of-improved-practices-using-acquisition-pilots/</loc><lastmod>2023-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/use-of-cmmi-in-acquisition-environments-sepg-2006/</loc></url><url><loc>https://www.sei.cmu.edu/library/back-to-the-future-leveraging-your-sw-cmm-investment-to-support-transition-to-cmmi/</loc><lastmod>2024-04-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/thoughts-on-applying-cmmi-in-small-settings/</loc></url><url><loc>https://www.sei.cmu.edu/library/are-you-prepared-for-cmmi/</loc></url><url><loc>https://www.sei.cmu.edu/library/lessons-learned-from-adopting-cmmi-in-small-organizations/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/global-software-development-saturn-2006/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-pilots-to-assess-the-value-and-approach-of-cmmi-implementation/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-make-the-switch-evidence-about-the-benefits-of-cmmi/</loc></url><url><loc>https://www.sei.cmu.edu/library/uls-systems-research-roadmap-2008/</loc></url><url><loc>https://www.sei.cmu.edu/library/design-and-analysis-principles-for-software-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/trl-corollaries-for-practice-based-technologies/</loc><lastmod>2023-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/running-an-sepg-how-ssc-san-diego-operates-its-sepg/</loc></url><url><loc>https://www.sei.cmu.edu/library/service-oriented-product-lines-towards-a-development-process-and-feature-management-model-for-web-services/</loc></url><url><loc>https://www.sei.cmu.edu/library/identifying-risks-in-outsourcing-software-intensive-projects/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/improving-software-acquisition-processes-a-study-of-real-project-costs/</loc><lastmod>2023-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/navairseimitre-strategic-collaboration/</loc><lastmod>2024-05-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tips-for-organizations-working-together-at-different-maturity-levels-sepg-2006/</loc><lastmod>2024-04-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/about-sustaining-process-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-a-service-oriented-approach-in-tsat/</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-reviews-since-acquisition-reform-the-artifact-perspective/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/applying-cmmi-to-a-production-support-software-maintenance-environment/</loc></url><url><loc>https://www.sei.cmu.edu/library/high-maturitycapability-appraisals/</loc></url><url><loc>https://www.sei.cmu.edu/library/high-maturity-misconceptions-common-misinterpretations-of-cmmi-maturity-levels-4-and-5/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-family-of-scampi-appraisal-methods/</loc></url><url><loc>https://www.sei.cmu.edu/library/scampi-bc-tutorial-sepg-2004/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-six-sigma-to-accelerate-cmmi-adoption-and-vice-versa/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/accelerating-cmmi-adoption-using-six-sigma-northrop-grumman-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-does-high-maturity-benefit-the-customer/</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/collaborative-governmentcontractor-scampi-appraisal/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/debating-the-tough-change-requests-appraisal-perspectives/</loc></url><url><loc>https://www.sei.cmu.edu/library/choosing-how-to-implement-cmmi/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-transition-at-motorola-gsg/</loc><lastmod>2024-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/best-practices-in-teaching-cmmi/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/hidden-treasure-the-implementation-of-cmmi-practices-by-agile-methods/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/high-maturity-measurement-workshop/</loc></url><url><loc>https://www.sei.cmu.edu/library/tutorial-if-youre-living-the-high-life-youre-living-the-informative-material/</loc></url><url><loc>https://www.sei.cmu.edu/library/implementing-capability-maturity-model-integrated-cmmi-in-a-diverse-organization/</loc></url><url><loc>https://www.sei.cmu.edu/library/gaining-cmmi-success-in-the-us-private-sector/</loc></url><url><loc>https://www.sei.cmu.edu/library/smart-ulss-forum-electricity/</loc></url><url><loc>https://www.sei.cmu.edu/library/camping-on-a-seesaw-gms-iss-process-improvement-approach/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-for-services-introducing-the-cmmi-for-services-constellation/</loc></url><url><loc>https://www.sei.cmu.edu/library/implementing-the-cmmi-within-an-information-technology-organization/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-regression-testing/</loc><lastmod>2023-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-superior-process-requirements/</loc><lastmod>2024-03-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/scale-changes-everything-icgse-2006/</loc><lastmod>2024-04-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/speculations-on-coordination-models/</loc></url><url><loc>https://www.sei.cmu.edu/library/keynote-engineering-safety-and-security-related-requirements-for-software-intensive-systems-icse-2010/</loc></url><url><loc>https://www.sei.cmu.edu/library/engineering-safety-and-security-related-requirements-for-software-intensive-systems-icse-2010/</loc><lastmod>2024-07-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-ideal-model/</loc></url><url><loc>https://www.sei.cmu.edu/library/specifying-initial-design-review-and-final-design-review-criteria/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/identifying-acquisition-patterns-of-failure-using-system-archetypes/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-integrated-view-of-process-and-measurement/</loc></url><url><loc>https://www.sei.cmu.edu/library/interpreting-cmmi-high-maturity-for-small-organizations-2008/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2nd-international-off-the-shelf-development-method-workshop-report/</loc><lastmod>2024-03-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-internal-offshore-experience-at-reuters/</loc></url><url><loc>https://www.sei.cmu.edu/library/meeting-the-challenges-of-ultra-large-scale-distributed-real-time-embedded-dre-systems-isorc/</loc></url><url><loc>https://www.sei.cmu.edu/library/issues-of-scale-a-community-perspective/</loc></url><url><loc>https://www.sei.cmu.edu/library/extreme-programming-six-sigma-cmmi-how-they-can-work-together-a-jpmorgan-chase-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/systems-networks-and-information-integration-context-for-software-assurance/</loc><lastmod>2023-12-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/hard-questions-for-process-improvement-in-multimodel-environments-workshop-opening-remarks/</loc></url><url><loc>https://www.sei.cmu.edu/library/measurement-within-the-cmmi/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/successful-acquisition-of-faa-terminal-doppler-weather-radar/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/capability-maturity-model-integration-v13-and-architecture-centric-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/product-lines-that-supply-other-product-lines-a-service-oriented-approach/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/20-points-for-quality-and-process-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/panel-discussion-20-years-of-architecture-rick-kazman/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-mashup-of-techniques-to-create-reference-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/evolutionary-acquisition-of-the-future-combat-systems-fcs/</loc><lastmod>2023-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/experiences-with-focused-scampi-at-nasa/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-for-acquisition-organizations-the-next-wave-of-outsourcing-sepg-2006/</loc></url><url><loc>https://www.sei.cmu.edu/library/enabling-future-technology-ultra-large-scale-systems-in-the-army/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/getting-started-in-process-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/kisss-keep-it-simple-smart-and-sustainable-agile-process-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-scampi-appraisal-method-top-ten-misperceptions/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-cmmi-product-suite-and-international-standards/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-technology-initiative-saturn-2007/</loc><lastmod>2024-05-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-future-directions-in-sei-software-architecture-technology-sat-initiative-saturn-2006/</loc></url><url><loc>https://www.sei.cmu.edu/library/high-maturity-how-do-we-know/</loc></url><url><loc>https://www.sei.cmu.edu/library/workshop-on-service-oriented-architectures-and-software-product-lines-putting-both-together-soapl-2008/</loc><lastmod>2025-01-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/service-oriented-architectures-and-product-lines-what-is-the-connection/</loc></url><url><loc>https://www.sei.cmu.edu/library/imaging-services-on-the-grid-as-a-product-line-requirements-and-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/rapid-improvement-team-rit-initiative-with-gtn-21-lessons-learned-from-gtn-2/</loc><lastmod>2024-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/defense-systems-systems-engineering/</loc><lastmod>2024-03-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-centric-development-method-saturn-2006/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/lean-cmmi-based-process-improvement/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/lean-thinking-with-cmmi/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/lessons-learned-from-a-joint-cmmi-and-sse-cmm-class-b-scampi-appraisal/</loc></url><url><loc>https://www.sei.cmu.edu/library/identifying-and-specifying-reusable-services-of-service-centric-systems-through-product-line-technology/</loc><lastmod>2024-06-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/leveraging-cmmi-acq-and-cmmi-dev-to-improve-supplier-performance/</loc></url><url><loc>https://www.sei.cmu.edu/library/lessons-learned-from-service-oriented-systems-for-engineering-systems-of-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/architectural-implications-of-cloud-computing/</loc></url><url><loc>https://www.sei.cmu.edu/library/limits-to-the-use-of-the-zachman-framework-in-developing-and-evolving-architectures-for-complex-systems-of-systems-saturn-2009/</loc></url><url><loc>https://www.sei.cmu.edu/library/usukaus-trilateral-software-intensive-systems-acquisition-improvement-group-sisaig/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-incompatibility-between-software-component-based-development-and-present-uk-mod-procurement-approaches/</loc><lastmod>2023-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/developing-enterprise-wide-measures-for-tracking-acquisition-performance/</loc><lastmod>2023-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/can-six-sigma-and-cmmi-get-along/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-cmmi-supports-efficient-implementation-of-functional-safety/</loc><lastmod>2024-03-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/making-process-improvement-work/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-framework-for-making-architectural-decisions-in-a-business-context-saturn-2009/</loc><lastmod>2025-06-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/integrated-architecture-development/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/managing-change-the-human-factor-in-process-improvement-initiatives/</loc><lastmod>2024-03-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/use-of-questionnaire-based-appraisals-in-process-improvement-programs/</loc><lastmod>2024-06-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/future-directions-of-the-software-architecture-technology-initiative/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-technology-initiative-saturn-2008/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/managing-software-risks-in-software-intensive-systems-with-metrics-and-measures/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-state-of-practice-in-dod-acquisitions-and-some-proposed-alternatives/</loc><lastmod>2023-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/match-point-who-will-win-the-game-itil-or-cmmi-svc/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-intensive-system-acquisition-best-practices/</loc><lastmod>2024-01-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/model-based-improvement/</loc><lastmod>2024-01-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/process-improvement-in-an-organization-on-steroids-how-to-maintain-quality-as-your-organization-grows-rapidly/</loc></url><url><loc>https://www.sei.cmu.edu/library/driving-out-technical-risk-by-blending-architecture-process-and-project-discipline/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-case-for-using-tsp-with-cmmcmmi/</loc></url><url><loc>https://www.sei.cmu.edu/library/key-business-indicator-trends-during-the-journey-from-sw-cmm-level-2-to-cmmi-level-5-at-lockheed-martin-data-management-systems/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/can-you-trust-your-data-measurement-and-analysis-infrastructure-diagnosis/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/understanding-cmmi-measurement-capabilities-impact-on-performance-results-from-the-2007-sei-state-of-the-measurement-practice-survey/</loc><lastmod>2024-01-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-use-of-measures-in-security-analysis/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measuring-acquisition-processes/</loc></url><url><loc>https://www.sei.cmu.edu/library/measuring-systems-interoperability/</loc><lastmod>2024-05-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/creating-an-innovation-process-and-culture/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-method-for-reasoning-about-an-acquisition-strategy/</loc></url><url><loc>https://www.sei.cmu.edu/library/method-engineering-using-opfro/</loc><lastmod>2024-01-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measurement-and-analysis-what-can-and-does-go-wrong-2/</loc><lastmod>2024-01-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sosi-system-of-systems-interoperability/</loc><lastmod>2024-03-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tutorial-the-method-framework-for-engineering-system-architectures-mfesa/</loc><lastmod>2024-06-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-method-framework-for-engineering-systems-architectures-mfesa/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-method-framework-for-engineering-system-architectures-mfesa/</loc></url><url><loc>https://www.sei.cmu.edu/library/method-framework-for-engineering-system-architecture/</loc><lastmod>2024-08-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mfesa-one-day-tutorial-sstc-2009/</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/principles-of-architecture-design-and-evaluation/</loc></url><url><loc>https://www.sei.cmu.edu/library/meeting-the-challenges-of-ultra-large-scale-distributed-real-time-embedded-systems-with-qos-enabled-middleware-model-driven-engineering/</loc><lastmod>2024-01-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/enterprise-process-improvement-approach/</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/defining-acquisition-measures-the-integrated-software-acquisition-metrics-isam-project/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/designing-your-tailoring-approach-to-help-achieve-higher-levels-of-maturity/</loc><lastmod>2024-04-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/analyzing-defects-can-tell-a-lot-about-a-company/</loc></url><url><loc>https://www.sei.cmu.edu/library/process-improvement-in-a-multimodel-environment-past-present-and-future/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-appraisal-method-interactions/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-driven-construction-of-certified-binaries/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-modest-process-area-proposal-blame-allocation/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-not-network-centric-acquisition/</loc><lastmod>2024-03-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/getting-through-your-scampi-appraisal-using-cmmi-to-make-and-measure-meaningful-improvements/</loc></url><url><loc>https://www.sei.cmu.edu/library/experiences-with-indicator-based-cmmi-appraisals-at-raytheon/</loc></url><url><loc>https://www.sei.cmu.edu/library/evaluating-a-partial-architecture-in-a-uls-context/</loc></url><url><loc>https://www.sei.cmu.edu/library/technology-examples-of-cmmi-benefits-august-2004/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-the-mission-diagnostic-lessons-learned-2008/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/enterprise-architecture-and-cots-intensive-system-acquisition-strategies/</loc></url><url><loc>https://www.sei.cmu.edu/library/multi-constellationmodel-tutorial/</loc><lastmod>2024-01-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/exploring-cmmi-iso-90012000-synergy-when-developing-a-process-improvement-strategy/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecting-standard-processes-with-swebok-and-cmmi/</loc></url><url><loc>https://www.sei.cmu.edu/library/over-under-around-and-through-using-the-cmmi-continuous-and-staged-representations-together-to-optimize-process-improvement/</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/product-based-approach-for-cmmi-appraisals/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-conceptual-framework-for-network-centric-warfare/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/new-directions-in-risk-management-at-the-sei/</loc></url><url><loc>https://www.sei.cmu.edu/library/new-directions-in-risk-a-success-oriented-approach-2009/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/revitalizing-the-software-acquisition-process/</loc><lastmod>2024-05-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/air-force-software-intensive-systems-strategic-improvement-program-afssip/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-future-trends-in-systems-and-software-engineering-bode-well-for-enabling-improved-acquisition-and-performance-of-defense-systems/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ultra-large-scale-systems-scale-changes-everything/</loc></url><url><loc>https://www.sei.cmu.edu/library/panel-discussion-20-years-of-architecture-linda-northrop/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-sei-software-architecture-technology-user-network-saturn-2005/</loc><lastmod>2024-04-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/extensibility-as-a-collaboration-enabler-a-case-study-for-group-context-aware-mobile-applications/</loc></url><url><loc>https://www.sei.cmu.edu/library/we-have-all-been-here-before-recurring-patterns-across-12-us-air-force-acquisition-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-illusion-of-certainty-presentation/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-practices-good-and-bad/</loc></url><url><loc>https://www.sei.cmu.edu/library/refining-software-development-estimation-techniques-for-the-federal-aviation-administration-en-route-systems-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/scale-changes-everything/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-six-sigma-to-accelerate-the-adoption-of-cmmi-for-optimal-results/</loc><lastmod>2024-07-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/organizational-considerations-for-the-estimating-process/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/atlas-shrugged/</loc></url><url><loc>https://www.sei.cmu.edu/library/dos-and-donts-of-process-improvement-2004/</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/debating-the-tough-scampi-change-requests/</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dos-and-donts-of-process-improvement-2008/</loc></url><url><loc>https://www.sei.cmu.edu/library/fourteen-sces-around-the-world-in-less-than-40-days/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/overview-of-distributed-constraint-satisfaction-and-optimization/</loc></url><url><loc>https://www.sei.cmu.edu/library/welcome-to-saturn-2007-the-third-sei-software-architecture-technology-user-network-workshop-saturn-2007/</loc><lastmod>2024-04-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-comparison-of-requirements-specification-methods-from-a-software-architecture-perspective-saturn-2006/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-certification-panel-saturn-2010/</loc></url><url><loc>https://www.sei.cmu.edu/library/ultra-large-scale-systems-development-challenges-at-siemens/</loc></url><url><loc>https://www.sei.cmu.edu/library/rapid-and-adaptive-system-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/scenario-driven-system-engineering-sdse-for-system-of-systems-acquisition/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-today-the-current-state/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-people-cmm-as-a-contribuor-to-other-models-and-frameworks/</loc><lastmod>2023-11-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/prediction-enabled-component-technology-presentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-practical-application-of-cmmi-level-5-practices/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/integrating-cmmi-six-sigma-in-software-and-systems-engineering/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/scampi-lessons-learned/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-a-balanced-scorecard-to-help-achieve-cmmi-maturity-level-4/</loc></url><url><loc>https://www.sei.cmu.edu/library/business-value-and-customer-benefits-derived-from-high-maturity/</loc></url><url><loc>https://www.sei.cmu.edu/library/dar-basics-applying-decision-analysis-and-resolution-in-the-real-world/</loc></url><url><loc>https://www.sei.cmu.edu/library/dar-to-be-more-effective-applying-decision-analysis-and-resolution-with-good-sense/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-to-untangle-the-hairball-integrating-cmmi-and-itil-effectively-in-application-engineering-and-operations-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-product-lines/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-improving-and-integrating/</loc><lastmod>2024-01-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-today/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-version-12-and-beyond-sepg-2007/</loc></url><url><loc>https://www.sei.cmu.edu/library/implementing-the-cmmi-in-a-six-sigma-world/</loc><lastmod>2026-01-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/process-in-execution-review-pier-and-the-scampi-b-method/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measuring-institutionalization/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/product-line-systems-program-talk-sepg-2008/</loc><lastmod>2023-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/examining-product-line-readiness-experiences-with-the-sei-product-line-technical-probe/</loc><lastmod>2024-01-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/less-is-in-fact-more-60-paper-reduction-using-an-enterprise-wide-process-framework/</loc><lastmod>2024-03-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/avoiding-a-documentation-glut-when-achieving-cmm-or-cmmi/</loc><lastmod>2024-04-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-practitioner-view-of-cmmi-process-performance-models/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measuring-and-managing-the-cmmi-journey-using-gqm/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-approach-to-harmonization/</loc><lastmod>2024-07-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/overview-of-a-proactive-software-product-line-acquisition-approach/</loc></url><url><loc>https://www.sei.cmu.edu/library/exactly-what-are-process-performance-models-in-the-cmmi/</loc><lastmod>2024-01-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/process-and-procedure-definition-a-primer/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-intensive-systems-producibility/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/panel-promising-research-areas/</loc><lastmod>2024-01-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/quality-assessment-of-system-architectures-and-their-requirements/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/quality-assessment-system-architectures/</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/quality-assessment-of-system-architectures-and-their-requirements-quasar-version-30/</loc></url><url><loc>https://www.sei.cmu.edu/library/tutorial-quality-assessment-of-system-architectures-and-their-requirements-quasar/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/hard-questions-for-process-improvement-in-multimodel-environments-workshop-breakout-session-strategy-rounds-1-and-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/hard-questions-for-process-improvement-in-multimodel-environments-workshop-breakout-session-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/hard-questions-for-process-improvement-in-multimodel-environments-workshop-breakout-session-implementation-issues/</loc></url><url><loc>https://www.sei.cmu.edu/library/hard-questions-for-process-improvement-in-multimodel-environments-workshop-breakout-session-technology-relationships/</loc></url><url><loc>https://www.sei.cmu.edu/library/comparison-of-service-and-software-product-family-modeling/</loc></url><url><loc>https://www.sei.cmu.edu/library/return-on-investment-roi-from-oid-and-cwi/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-current-state-and-future-plans/</loc></url><url><loc>https://www.sei.cmu.edu/library/getting-program-decision-makers-to-use-and-be-part-of-risk-management-process/</loc><lastmod>2025-01-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/reflections-on-software-agility-and-agile-methods-challenges-dilemmas-the-way-ahead/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/calculating-cmmi-based-roi-why-when-what-and-how/</loc></url><url><loc>https://www.sei.cmu.edu/library/rethinking-risk-management-tutorial/</loc></url><url><loc>https://www.sei.cmu.edu/library/reusable-security-requirements/</loc><lastmod>2024-02-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/unintended-consequences-of-measurement-causes-and-cures/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/quality-for-it-development-and-it-service-operations-cmmi-and-itil-in-a-common-quality-approach/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2006-working-session-strategic-risk-management-for-architectures/</loc><lastmod>2024-02-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-risk-reduction-activities-saturn-2006/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-technical-overview-of-risk-and-opportunity-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-sei-software-architecture-technology-user-network/</loc></url><url><loc>https://www.sei.cmu.edu/library/semantic-web-services-based-reasoning-in-the-design-of-software-product-lines/</loc><lastmod>2024-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/scampi-bc-pilots-in-acquisition-environments/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/scampi-lead-appraiser-body-of-knowledge-overview/</loc><lastmod>2024-02-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/engineering-safety-related-requirements-for-software-intensive-systems-september-2005/</loc><lastmod>2024-04-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/samsung-sds-experience-performing-scampi-class-a-with-the-people-cmm/</loc></url><url><loc>https://www.sei.cmu.edu/library/leveraging-piids-for-continuous-process-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-product-line-architecture-for-army-aviation-diagnostics-and-maintenance-views-and-evolution-saturn-2007/</loc></url><url><loc>https://www.sei.cmu.edu/library/working-session-software-architecture-competence/</loc></url><url><loc>https://www.sei.cmu.edu/library/scampi-b-for-contract-monitoring/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/delivering-a-cmmi-compliant-project-plan-in-30-minutes/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-process-oriented-practical-approach-to-program-office-systems-engineering-management-using-the-cmmi-am-as-a-guide/</loc></url><url><loc>https://www.sei.cmu.edu/library/adaptive-system-infrastructure-for-ultra-large-scale-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/panel-discussion-20-years-of-architecture-douglas-schmidt/</loc></url><url><loc>https://www.sei.cmu.edu/library/meeting-the-challenge-of-enterprise-distributed-real-time-and-embedded-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-role-of-the-revised-ieee-standard-dictionary-of-measures-of-the-software-aspects-of-dependability-in-software-acquisition/</loc><lastmod>2024-03-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-acquisition-life-cycle-measure-plan-based-on-the-revised-ieee-p1633aiaa-r-013a-recommended-practice-on-software-reliability/</loc></url><url><loc>https://www.sei.cmu.edu/library/panel-discussion-20-years-of-architecture-robert-schwanke/</loc></url><url><loc>https://www.sei.cmu.edu/library/scrump-scrum-rup-and-cmmi/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-design-for-six-sigma-sdfss-and-sei-technologies-meet/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-taxonomy-of-variability-in-web-service-flows/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-partner-network-a-global-network-of-trusted-providers/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/experimentation-in-the-use-of-service-orientation-in-resource-constrained-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/current-sat-work-in-architecture-evolution-saturn-2008/</loc></url><url><loc>https://www.sei.cmu.edu/library/interpretive-guidance-what-weve-learned/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-to-sell-process-improvement/</loc><lastmod>2024-01-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/future-trends-in-systems-and-software-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/tailoring-and-combining-the-cmmi-acq-and-quality-models-to-improve-the-militarys-requirements-process/</loc></url><url><loc>https://www.sei.cmu.edu/library/scampi-lessons-learned-from-experiences-in-the-field/</loc><lastmod>2024-06-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/project-management-by-functional-capability/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/applying-cmmi-in-information-technology-organizations/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-product-lines-past-present-and-future/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-the-current-state/</loc></url><url><loc>https://www.sei.cmu.edu/library/six-sigma-tools-for-early-adopters/</loc></url><url><loc>https://www.sei.cmu.edu/library/from-projects-to-product-lines-a-product-line-economics-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-acquirers-guide-to-navigating-contractor-data/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/achieving-success-via-multi-model-process-improvement-sepg-2007/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrating-cmmi-and-six-sigma-in-software-and-systems-engineering/</loc><lastmod>2024-01-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/improper-use-of-control-charts-traps-to-avoid/</loc></url><url><loc>https://www.sei.cmu.edu/library/smart-ultra-large-scale-systems-forum-scale-changes-everything/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-alternative-to-trls-for-cots-software-intensive-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/debating-the-tough-change-requests-appraisal-perspectives-by-kathy-smith/</loc></url><url><loc>https://www.sei.cmu.edu/library/soa-research-agenda/</loc></url><url><loc>https://www.sei.cmu.edu/library/quality-assessment-of-system-architectures-and-their-requirements-quasar-sosecie-2010/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-architecture-evaluation-with-concurrent-development-saturn-2007/</loc></url><url><loc>https://www.sei.cmu.edu/library/organizational-implications-of-systems-of-systems/</loc><lastmod>2025-09-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-to-start-and-sustain-a-local-spin-chapter/</loc><lastmod>2024-01-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-approach-to-software-product-line-acquisition-planning/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-product-line-essentials/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-product-lines-reuse-that-makes-business-sense-boeing-software-conference/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sprint-with-scrum-and-get-work-done/</loc><lastmod>2024-01-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/harvesting-cmmi-benefits-the-six-sigma-sickle/</loc></url><url><loc>https://www.sei.cmu.edu/library/ssas-journey-to-sw-cmm-ml3-and-transition-to-cmmi/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-architecture-centric-methods-within-plan-driven-and-agile-software-development-processes/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/applying-software-architecture/</loc><lastmod>2024-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/characterizing-technical-software-performance-within-system-of-systems-acquisitions-a-step-wise-methodology-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/measurement-that-works-really/</loc></url><url><loc>https://www.sei.cmu.edu/library/integration-and-interoperability-models-for-systems-of-systems/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2006-state-of-software-measurement-practice-survey/</loc><lastmod>2024-03-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/it-takes-an-ecosystem/</loc></url><url><loc>https://www.sei.cmu.edu/library/preserving-the-cmm-investment-when-transitioning-to-cmmi/</loc><lastmod>2024-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-a-strong-and-principled-ppqa-overcomes-acute-challenges-to-process-improvement/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-level-5-processes-make-it-easy-to-define-and-deploy-measurable-achievable-goals-to-your-organization/</loc></url><url><loc>https://www.sei.cmu.edu/library/uls-ecosystem-design/</loc></url><url><loc>https://www.sei.cmu.edu/library/ultra-large-scale-uls-systems-cbse-2009/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/surveying-systems-engineering-effectiveness/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/survival-in-a-systems-of-systems-world/</loc><lastmod>2024-06-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/august-2004-software-cmm-performance-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/march-2004-software-cmm-performance-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/march-2005-software-cmm-performance-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/march-2006-software-cmm-performance-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/september-2005-software-cmm-performance-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-outsourcing-with-cmmi/</loc></url><url><loc>https://www.sei.cmu.edu/library/principles-in-a-dod-acquisition/</loc><lastmod>2024-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/bridging-system-and-software-architecture-saturn-2006/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-taxonomy-of-operational-risks-2/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/current-sei-sat-initiative-technology-investigations/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-is-rd-in-the-cyber-and-software-engineering-environment-different-sstc-2010/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-ukus-bilateral-on-improving-military-software-intensive-system-acquisition-a-uk-view/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-centric-design-method/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tools-supporting-cmmi-high-maturity-for-small-organizations-2008/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-scampi-appraisal-method-top-ten-myths-2004-edition/</loc></url><url><loc>https://www.sei.cmu.edu/library/technology-examples-of-cmmi-benefits/</loc></url><url><loc>https://www.sei.cmu.edu/library/trading-places-measurement-and-analysis-in-the-eyes-of-the-acquirer-and-the-supplier/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-measurement-and-analysis-training-solution-supporting-cmmi-and-six-sigma-transition/</loc></url><url><loc>https://www.sei.cmu.edu/library/transformation-of-a-software-development-organization-using-software-acquisition-practices-a-case-study/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-the-team-software-process-sepg-europe-2010/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-psp-at-intuit/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/team-software-process-for-secure-systems-development/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-product-maturity-in-sis-source-selection/</loc></url><url><loc>https://www.sei.cmu.edu/library/engineering-safety-and-security-related-requirement-for-software-intensive-systems/</loc><lastmod>2024-02-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/introduction-the-cmmi-acquisition-module-background/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/introduction-the-cmmi-acquisition-module-project-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-the-cmmi-acquisition-module-engineering/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/introduction-the-cmmi-acquisition-module-support/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-the-cmmi-acquisition-module-generic-practices/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-the-cmmi-acquisition-module-using-cmmi-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-the-cmmi-acquisition-module-conclusion/</loc></url><url><loc>https://www.sei.cmu.edu/library/comanche-process-improvement-vision-and-initiatives/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-common-operating-environment-soscoe-support-to-net-centricity/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/uls-systems-research-roadmap/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/use-of-cmmi-in-acquisition-environments-sstc-2006/</loc><lastmod>2024-04-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-cert-rmm-in-a-software-and-system-assurance-context/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-dev-v12-model-changes/</loc><lastmod>2024-04-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-dev-v12-scampi-a-appraisal-method-changes/</loc><lastmod>2024-03-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-dev-v12-training-changes/</loc><lastmod>2024-04-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-holistic-approach-to-process-improvement-using-the-people-cmm-and-the-cmmi-dev-technology-process-people-and-culture-the-holistic-quadripartite/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-security-setting-the-stage/</loc></url><url><loc>https://www.sei.cmu.edu/library/softwares-inoperable-interoperability-problem/</loc></url><url><loc>https://www.sei.cmu.edu/library/execution-the-key-to-success/</loc><lastmod>2024-07-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/process-improvement-in-retrospective-lessons-learned-from-software-projects/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-process-improvement-journey-of-boeing-information-services-wichita/</loc></url><url><loc>https://www.sei.cmu.edu/library/upgrading-to-cmmi-at-bosch/</loc></url><url><loc>https://www.sei.cmu.edu/library/implementing-best-practices-in-the-joint-battlespace-infosphere-jbi-program-at-afrl/</loc><lastmod>2024-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/applied-computational-mechanism-design/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/integrating-warfighter-driven-system-of-systems-integration-into-the-acquisition-life-cycle/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/large-scale-creative-work-2005/</loc></url><url><loc>https://www.sei.cmu.edu/library/requirements-nightmare-put-to-rest-fa-18-advanced-weapons-laboratory/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmcmmi-level-4-quantitative-measurement-versus-qualitative-management/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/what-functional-groups-are-included-in-the-cmmi-seswippdss-model/</loc></url><url><loc>https://www.sei.cmu.edu/library/welcome-presentation-saturn-2008/</loc></url><url><loc>https://www.sei.cmu.edu/library/welcome-to-the-fourth-sei-software-architecture-technology-user-network-workshop/</loc><lastmod>2024-04-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/meeting-the-challenge-of-a-scampi-level-5-appraisal/</loc></url><url><loc>https://www.sei.cmu.edu/library/people-cmm-and-cmmi-synergy-maintaining-long-term-cmmi-based-improvement-through-enhanced-workforce-practices/</loc><lastmod>2024-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/transition-from-sw-cmm-to-cmmi-the-benefits-continue/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-diagnostic-roadmap/</loc></url><url><loc>https://www.sei.cmu.edu/library/evolving-the-sepg-to-a-cmmi-world/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-if-you-dont-know-where-you-stand-youre-not-ready-for-an-internal-appraisal/</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmmi-and-six-sigma-synergy/</loc><lastmod>2024-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-software-maturity-matrix-a-software-performance-metric/</loc><lastmod>2023-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-oversight-as-a-function-of-program-office-capability/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/meeting-the-challenges-of-ultra-large-scale-distributed-real-time-embedded-dre-systems-wpdrts/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-technology-user-network-saturn-2005-wrap-up/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measurement-and-analysis-for-the-acquirer/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-and-mature-combining-a-cmmi-scampi-with-an-isoiec-21827-sse-cmm-appraisal/</loc></url><url><loc>https://www.sei.cmu.edu/library/measurement-in-a-process-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/time-bounded-analysis-of-real-time-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-optimal-real-time-voltage-and-frequency-scaling-for-uniform-multiprocessors/</loc><lastmod>2025-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/on-resource-overbooking-in-an-unmanned-aerial-vehicle/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/if-youre-living-the-high-life-youre-living-the-informative-material/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-a-software-architecture-community-saturn-2006-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/evolution-of-a-science-project/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-effects-of-incentives-in-acquisition-competition-on-program-outcomes/</loc><lastmod>2024-07-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/empirically-based-analysis-the-ddos-case/</loc></url><url><loc>https://www.sei.cmu.edu/library/detection-and-analysis-of-scans-on-very-large-networks/</loc></url><url><loc>https://www.sei.cmu.edu/library/locality-based-analysis-of-network-flows/</loc><lastmod>2024-02-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/analysis-of-the-us-cert-dac/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-telescopes-the-flocon-files/</loc></url><url><loc>https://www.sei.cmu.edu/library/flow-data-analysis-in-switch-eth-zurich-project-ddosvax/</loc></url><url><loc>https://www.sei.cmu.edu/library/aircert-building-a-framework-for-cross-administrative-domain-data-sharing/</loc><lastmod>2024-02-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/netflow-data-capturing-and-processing-at-switch-and-eth-zurich/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-at-line-speed-with-netflows/</loc></url><url><loc>https://www.sei.cmu.edu/library/data-sharing-lessons-learned-by-the-certcc-and-the-certnetsa-groups/</loc></url><url><loc>https://www.sei.cmu.edu/library/sharing-intelligence-is-our-best-defense-incentives-that-work-versus-disincentives-that-can-be-solved/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-state-of-standardization-efforts-to-support-data-exchange-in-the-security-domain/</loc></url><url><loc>https://www.sei.cmu.edu/library/wish-list/</loc><lastmod>2024-03-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/nerd-network-emergency-responder-detector/</loc></url><url><loc>https://www.sei.cmu.edu/library/visflowconnect-ip-an-animated-link-analysis-tool-for-visualizing-netflows-presentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/covert-channel-detection-using-process-query-systems-presentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/correlations-between-quiescent-ports-in-network-flows-presentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/detecting-distributed-attacks-using-network-wide-flow-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/time-pollution-and-maps/</loc></url><url><loc>https://www.sei.cmu.edu/library/behavior-based-approach-to-network-traffic-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/r-a-proposed-analysis-and-visualization-environment-for-network-security-data-presentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/distributed-qos-monitoring/</loc></url><url><loc>https://www.sei.cmu.edu/library/ip-flow-information-export-ipfix/</loc></url><url><loc>https://www.sei.cmu.edu/library/data-mining-netflow-so-whats-next/</loc><lastmod>2024-03-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/canine-a-netflows-conversionanonymization-tool-for-format-interoperability-and-secure-sharing-presentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/nvisionip-an-animated-state-analysis-tool-for-visualizing-netflows-presentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/flow-analysis-and-interoperability-data-models/</loc></url><url><loc>https://www.sei.cmu.edu/library/working-with-flow-data-in-an-academic-environment-in-the-ddosvax-project-at-eth-zuerich/</loc></url><url><loc>https://www.sei.cmu.edu/library/analysis-methods-discussion/</loc><lastmod>2024-06-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/bidirectional-flow-measurement-ipfix-and-security-analysis/</loc><lastmod>2024-06-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/anomaly-detection-through-blind-flow-analysis-inside-a-local-network-presentation/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/anomaly-based-botserver-and-more-detection/</loc></url><url><loc>https://www.sei.cmu.edu/library/ipfixpsamp-what-future-standards-can-offer-to-network-security-presentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-past-and-future-of-flow-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/attribution-and-aggregation-of-network-flows-for-security-analysis-presentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/impact-of-packet-sampling-on-anomaly-detection-metrics/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-case-for-packet-sampling/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-system-architecture-for-processing-flows/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/scalable-flow-analysis-presentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-traffic-analysis-of-a-small-private-network-compromised-by-an-online-gaming-host-presentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/analysis-of-network-beaconing-activity-for-incident-response/</loc></url><url><loc>https://www.sei.cmu.edu/library/integration-of-context-into-data-analysis-and-visualization/</loc></url><url><loc>https://www.sei.cmu.edu/library/yaf-a-case-study-in-flow-meter-design/</loc></url><url><loc>https://www.sei.cmu.edu/library/automatic-anomaly-detection-using-nfsen/</loc></url><url><loc>https://www.sei.cmu.edu/library/privacy-data-protection-law-and-flow-data-anonymization-requirements-issues-and-challenges/</loc></url><url><loc>https://www.sei.cmu.edu/library/attack-reduction-and-anomaly-modeling-in-popularly-targeted-protocols/</loc></url><url><loc>https://www.sei.cmu.edu/library/high-level-flow-correlation/</loc><lastmod>2025-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/simplifying-the-configuration-of-flow-monitoring-probes/</loc></url><url><loc>https://www.sei.cmu.edu/library/learning-to-surf/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-centric-procurement/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-provisioning-of-cloud-and-cloudlet-applications/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-emerging-set-of-integrated-architecture-and-agile-practices-that-speed-up-delivery/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-patterns-for-mobile-systems-in-resource-constrained-environments-2/</loc><lastmod>2025-06-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/design-and-analysis-of-cyber-physical-systems-aadl-and-avionics-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/emontage-an-architecture-for-rapid-integration-of-situational-awareness-data-at-the-edge/</loc></url><url><loc>https://www.sei.cmu.edu/library/mission-thread-workshop-preparation-and-execution/</loc></url><url><loc>https://www.sei.cmu.edu/library/dynamic-adaptation-of-flow-information-granularity-for-incident-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/amp-based-flow-collection/</loc></url><url><loc>https://www.sei.cmu.edu/library/automating-the-configuration-of-flow-monitoring-probes/</loc></url><url><loc>https://www.sei.cmu.edu/library/visual-representations-of-flow-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/design-for-large-scale-collection-system-using-flow-mediators/</loc><lastmod>2024-02-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flow-analysis-in-a-wireless-environment-with-short-dhcp-leases/</loc></url><url><loc>https://www.sei.cmu.edu/library/revisiting-the-threshold-random-walk-scan-detector/</loc></url><url><loc>https://www.sei.cmu.edu/library/one-year-of-peer-to-peer/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-analysis-of-point-of-sale-system-compromises/</loc></url><url><loc>https://www.sei.cmu.edu/library/identifying-anomalous-traffic-using-delta-traffic/</loc></url><url><loc>https://www.sei.cmu.edu/library/improvement-of-processes-for-flow-information/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-ripple-decoded/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/incorporating-network-flows-in-intrusion-incident-handling-and-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/on-terabit-flow-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/visualization-as-an-analysis-tool-presentation-supplement/</loc><lastmod>2024-06-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/visualizations-of-flow-and-analytical-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/hierarchical-bloom-filters-accelerating-flow-queries-and-analysis/</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flow-visualization-using-ms-excel/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-the-google-maps-api-for-flow-visualization/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/anonymizing-network-flow-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/scrub-netflows/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-flexible-ddos-detection-system-using-ipfix/</loc><lastmod>2024-02-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/traffic-analysis-of-udp-based-flows-in-ourmon/</loc></url><url><loc>https://www.sei.cmu.edu/library/flovis-summary/</loc></url><url><loc>https://www.sei.cmu.edu/library/flow-based-control-plane-situational-awareness/</loc></url><url><loc>https://www.sei.cmu.edu/library/hardware-accelerated-flexible-flow-measurement/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrating-human-and-synthetic-reasoning-via-model-based-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/labeled-full-packetflow-level-data-capture-towards-a-framework-for-instrumenting-cyber-warfare-exercises/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-and-monitoring-a-root-dns-service/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/is-there-any-value-in-bulk-network-traces/</loc></url><url><loc>https://www.sei.cmu.edu/library/welcome-to-flocon-2009/</loc></url><url><loc>https://www.sei.cmu.edu/library/netbytes-viewer-a-entity-based-visualization-tool/</loc></url><url><loc>https://www.sei.cmu.edu/library/viassist-visual-analytics-for-netflow-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/detecting-anomalies-in-interhosts-communication-graph/</loc></url><url><loc>https://www.sei.cmu.edu/library/ip-dossier/</loc><lastmod>2024-02-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/data-structures-for-ipv6-network-traffic-analysis-using-sets-and-bags/</loc></url><url><loc>https://www.sei.cmu.edu/library/traffic-clusters-in-networks-of-convenience/</loc></url><url><loc>https://www.sei.cmu.edu/library/analyzing-the-effectiveness-of-phishing-at-network-level/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-analysis-of-sampling-effects-on-graph-structures-derived-from-network-flow-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/activity-plot/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/camnep-multistage-collective-network-behavior-analysis-system-with-hardware-accelerated-netflow-probes/</loc></url><url><loc>https://www.sei.cmu.edu/library/shared-darknet-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/education-in-flow-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/detecting-spam-and-spam-responses/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-visualization-with-flovis/</loc></url><url><loc>https://www.sei.cmu.edu/library/flowbundle/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-primer-on-network-flow-visualization/</loc></url><url><loc>https://www.sei.cmu.edu/library/high-throughput-real-time-network-flow-visualization/</loc></url><url><loc>https://www.sei.cmu.edu/library/realtime-change-detection-automatic-network-response/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-flow-data-fusion-geospatial-and-netspatial-data-enhancement/</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-argus/</loc></url><url><loc>https://www.sei.cmu.edu/library/flow-traffic-analysis-narratives/</loc></url><url><loc>https://www.sei.cmu.edu/library/lessons-learned-while-providing-silk-training/</loc></url><url><loc>https://www.sei.cmu.edu/library/strip-plots-a-simple-automated-time-series-visualization/</loc></url><url><loc>https://www.sei.cmu.edu/library/traffic-analysis-using-streaming-queries/</loc></url><url><loc>https://www.sei.cmu.edu/library/abstracting-and-visualizing-host-behaviour-through-graphs/</loc></url><url><loc>https://www.sei.cmu.edu/library/know-your-network/</loc></url><url><loc>https://www.sei.cmu.edu/library/project-bloom-empowering-the-security-research-community-through-data-products-and-computing/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-case-study-using-flow-to-identify-specific-malware-characteristics/</loc></url><url><loc>https://www.sei.cmu.edu/library/iptv-traffic-qcast-ip-multicast-traffic-monitoring-system-with-ipfixpsamp/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-host-classification-using-statistical-analysis-of-flow-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/sasuke-traffic-monitoring-tool-traffic-shift-monitoring-based-on-correlation-between-bgp-messages-and-flow-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/towards-reliable-traffic-classification-using-visual-motifs/</loc></url><url><loc>https://www.sei.cmu.edu/library/simply-top-talkers/</loc><lastmod>2024-03-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dmnet-detection-mitigation-network-a-behavioral-analysis-system-supporting-trust-measurements/</loc></url><url><loc>https://www.sei.cmu.edu/library/first-experiences-with-cuckoo-bags/</loc></url><url><loc>https://www.sei.cmu.edu/library/stager-a-generic-tool-for-presenting-network-statistics/</loc></url><url><loc>https://www.sei.cmu.edu/library/flow-data-at-10-gige-and-beyond-what-can-or-should-we-do/</loc></url><url><loc>https://www.sei.cmu.edu/library/geography-of-internet2-netflow/</loc></url><url><loc>https://www.sei.cmu.edu/library/parallel-processing-in-netflow-data-fusion/</loc></url><url><loc>https://www.sei.cmu.edu/library/flow-analysis-for-network-situational-awareness/</loc><lastmod>2024-03-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-temporal-logic-for-network-flow-analysis/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dns-and-flow-bulk-dns-analysis/</loc><lastmod>2024-06-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/network-flow-analysis-using-silk-v113/</loc></url><url><loc>https://www.sei.cmu.edu/library/silk-and-the-virtual-training-environment/</loc></url><url><loc>https://www.sei.cmu.edu/library/beyond-the-top-talkers-empirical-correlation-of-conficker-c-infected-ip-space/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2010-keynote-flow-data-for-billing-and-routing/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-sie/</loc></url><url><loc>https://www.sei.cmu.edu/library/flow-valuations-based-on-network-service-cooperation/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-analysis-with-isilk/</loc><lastmod>2024-04-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/matlab-commands-in-numerical-python-numpy/</loc><lastmod>2024-06-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flows-as-a-topology-chart/</loc></url><url><loc>https://www.sei.cmu.edu/library/from-data-collection-to-action-achieving-rapid-identification-of-cyber-threats-and-perpetrators/</loc></url><url><loc>https://www.sei.cmu.edu/library/garbage-collection-using-flow-to-understand-private-network-data-leakage/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-flow-data-analysis-using-graph-pattern-search/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-rayon-visualization-toolkit/</loc></url><url><loc>https://www.sei.cmu.edu/library/indexing-full-packet-capture-data-with-flow/</loc><lastmod>2024-06-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/darkspace-construction-and-maintenance/</loc></url><url><loc>https://www.sei.cmu.edu/library/protographs-graph-based-approach-to-netflow-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/not-to-miss-small-amount-but-important-traffic/</loc></url><url><loc>https://www.sei.cmu.edu/library/detecting-botnets-with-netflow/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-flow-for-other-things-than-network-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-incident-discovery-and-correlation-on-gov-networks/</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/detecting-long-flows/</loc><lastmod>2024-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/leveraging-other-data-sources-with-flow-to-identify-anomalous-network-behavior/</loc></url><url><loc>https://www.sei.cmu.edu/library/dlp-detection-with-netflow/</loc></url><url><loc>https://www.sei.cmu.edu/library/analysis-pipeline-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/incorporating-dynamic-list-structures-into-yaf/</loc></url><url><loc>https://www.sei.cmu.edu/library/privacy-preserving-network-flow-recording/</loc><lastmod>2024-02-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/exploring-the-interactions-between-network-data-analysis-and-security-informationevent-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/real-time-topology-based-flow-visualization/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-virtual-flow-collection-and-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/entropy-based-measurement-of-ip-address-inflation-in-the-waledac-botnet/</loc></url><url><loc>https://www.sei.cmu.edu/library/implementing-secure-coding-standards-in-a-system-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-initiative/</loc></url><url><loc>https://www.sei.cmu.edu/library/operational-resiliency-management-an-introduction-to-the-resiliency-engineering-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/sustaining-operational-resiliency-a-process-improvement-approach-to-security-management-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/coordinated-non-intrusive-capturing-of-flow-paths/</loc></url><url><loc>https://www.sei.cmu.edu/library/real-time-situational-awareness-using-argus/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-flow-for-municipal-planning-political-economic-social-and-technical-contexts-of-the-city-of-pittsburgh/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/us-cert-netflow-visualization/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/implementing-packet-dynamic-awareness-in-argus/</loc></url><url><loc>https://www.sei.cmu.edu/library/lessons-learned-from-10-years-of-network-analysis-rd-for-defense-and-intel-customers/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-use-of-search-engines-for-massively-scalable-forensic-repositories/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/bruteforcing-in-the-shadows-evading-automated-detection/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/achieving-real-real-time-context-based-actionable-intelligence-in-cyber-investigations/</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/visualizing-traffic-on-network-topology/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-uberdata-source-holy-grail-or-final-fantasy/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/indicator-expansion-techniques-tracking-cyber-threats-via-dns-and-netflow-analysis/</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/from-bandwidth-to-beacon-detection-prism-and-touchpoints/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-profiling-with-silk/</loc></url><url><loc>https://www.sei.cmu.edu/library/automatic-network-protection-scenarios-using-netflow/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flow-indexing-making-queries-go-faster/</loc><lastmod>2024-02-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/monitoring-trends-in-network-flow-for-situational-awareness/</loc></url><url><loc>https://www.sei.cmu.edu/library/teaching-flow-analysis-with-live-flow-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/resiliency-engineering-framework-project-update/</loc><lastmod>2024-02-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/focus-on-resiliency-a-process-improvement-approach-to-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-situational-displays-from-network-flow-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/measurement-for-cooperative-network-defense-demons-and-blockmon/</loc><lastmod>2024-02-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flowintegrator-integrating-flow-technologies-with-mainstream-event-management-systems/</loc><lastmod>2024-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/designing-a-100-flow-generator-for-high-speed-networks-from-oc3-to-100gbe/</loc></url><url><loc>https://www.sei.cmu.edu/library/entropy-in-ip-darkspace-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2013-proceedings/</loc><lastmod>2026-03-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insider-threats-in-the-sdlc/</loc><lastmod>2026-01-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-confluence-of-physical-and-cyber-security-management/</loc><lastmod>2025-05-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/goal-based-assessment-for-the-cybersecurity-of-critical-infrastructure/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-resiliency-engineering-framework-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/taming-big-flow-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-analysis-with-silk-2013/</loc></url><url><loc>https://www.sei.cmu.edu/library/identifying-network-users-using-flow-based-behavioral-fingerprinting/</loc></url><url><loc>https://www.sei.cmu.edu/library/vulnerability-response-decision-assistance-vrda/</loc></url><url><loc>https://www.sei.cmu.edu/library/fisma-and-metrics/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/thinking-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/near-real-time-multi-source-flow-data-correlation/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/network-security-monitoring-in-minutes/</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/identifying-network-traffic-activity-via-flow-sizes/</loc></url><url><loc>https://www.sei.cmu.edu/library/detecting-insider-threats-with-netflow/</loc></url><url><loc>https://www.sei.cmu.edu/library/flow-analysis-using-mapreduce/</loc></url><url><loc>https://www.sei.cmu.edu/library/scalable-stacked-index-to-speed-access-to-multi-terabyte-netflow/</loc></url><url><loc>https://www.sei.cmu.edu/library/bro-for-real-time-large-scale-understanding/</loc></url><url><loc>https://www.sei.cmu.edu/library/detecting-malware-p2p-traffic-using-network-flow-and-dns-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/enhancing-network-situational-awareness-using-dpi-enhanced-ipfix/</loc></url><url><loc>https://www.sei.cmu.edu/library/scalable-netflow-analysis-with-hadoop/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-distributed-network-security-analysis-system-based-on-apache-hadoop-related-technologies/</loc></url><url><loc>https://www.sei.cmu.edu/library/flowviewer-maintaining-nasas-earth-science-traffic-situational-awareness/</loc><lastmod>2024-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/considerations-for-scan-detection-using-flow-data/</loc><lastmod>2024-02-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/presenting-mongoose-a-new-approach-to-traffic-capture/</loc></url><url><loc>https://www.sei.cmu.edu/library/situational-awareness-metrics-from-flow-and-other-data-sources/</loc><lastmod>2024-02-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/clairvoyant-squirrel-a-scalable-domain-name-classification-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/statistical-analysis-of-flow-data-using-python-and-redis/</loc></url><url><loc>https://www.sei.cmu.edu/library/visualization-where-are-we-going/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-anomaly-detection/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-malware-traffic-analysis-for-ips-analysts-with-scapy-and-dpkt-in-python/</loc></url><url><loc>https://www.sei.cmu.edu/library/limitations-of-traffic-analysis-at-large-scale/</loc></url><url><loc>https://www.sei.cmu.edu/library/analysis-of-communication-patterns-in-network-flows-to-discover-application-intent/</loc></url><url><loc>https://www.sei.cmu.edu/library/cybervr-a-model-to-compute-dollar-value-at-risk-of-loss-to-cyber-attack/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-limitations-of-analysis-at-scale/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-flow-2012-year-in-review/</loc></url><url><loc>https://www.sei.cmu.edu/library/lifecycle-models-for-survivable-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/home-computer-and-internet-user-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/rethinking-risk-management-2004/</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/vulnerability-discovery-bridging-the-gap-between-analysis-and-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-in-c-integers/</loc></url><url><loc>https://www.sei.cmu.edu/library/analysis-of-as112-traffic/</loc></url><url><loc>https://www.sei.cmu.edu/library/responsible-disclosure-a-case-study-of-cert-vu800133-dns-cache-poisoning-issue/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/from-netflow-to-ipfix-the-evolution-of-ip-flow-information-export/</loc></url><url><loc>https://www.sei.cmu.edu/library/preparing-rir-allocation-data-for-network-security-analysis-tasks/</loc></url><url><loc>https://www.sei.cmu.edu/library/mitigating-network-events-through-structured-information-sharing/</loc></url><url><loc>https://www.sei.cmu.edu/library/modeling-populations-of-large-scale-internet-threats/</loc><lastmod>2024-06-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/investigating-as112-routing-and-new-server-discovery/</loc></url><url><loc>https://www.sei.cmu.edu/library/static-analysis-for-software-quality/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-in-c-strings/</loc></url><url><loc>https://www.sei.cmu.edu/library/which-best-practices-are-best-for-me/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/applying-critical-success-factors-to-information-security-planning/</loc></url><url><loc>https://www.sei.cmu.edu/library/iodef-data-model-status-march-2004/</loc></url><url><loc>https://www.sei.cmu.edu/library/introducing-the-implementation-guide/</loc><lastmod>2023-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/building-a-practical-framework-for-enterprise-wide-security-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/maturing-your-approach-to-security-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/early-experience-from-the-jpcertcc-iodef-activity/</loc><lastmod>2024-02-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-survivable-network-analysis-method-assessing-survivability-of-critical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-survivable-network-analysis-method-assessing-survivability-of-critical-systems-2000/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threats-actual-attacks-by-current-and-former-and-software-engineers/</loc></url><url><loc>https://www.sei.cmu.edu/library/iodef-demonstration-inch-wb-ietf-59/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-real-data-on-a-real-problem/</loc></url><url><loc>https://www.sei.cmu.edu/library/rid-draft-update-migrating-to-iodef/</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/three-classes-based-model-of-traceback-system-between-ass-ietf59th-korea-inch-wg/</loc></url><url><loc>https://www.sei.cmu.edu/library/extended-incident-handling-working-group-inch-august-2004/</loc><lastmod>2024-01-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/iodef-data-model-status-august-2004/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/preventing-insider-sabotage-lessons-learned-from-actual-attacks/</loc></url><url><loc>https://www.sei.cmu.edu/library/inch-requirements-august-2004/</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/rid-ietf-draft-update-june-2004/</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/extending-the-charter-addressing-vulnerability-and-exploit-information/</loc></url><url><loc>https://www.sei.cmu.edu/library/extended-incident-handling-working-group-inch-presentation-slides/</loc><lastmod>2026-04-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/iodef-data-model-status-changes-from-02-to-03/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/iodef-implementation-guide-update-changes-from-00-to-01/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-architecture-for-tracing-incidents-across-the-internet/</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-risk-mitigation-model-lessons-learned-from-actual-insider-sabotage/</loc></url><url><loc>https://www.sei.cmu.edu/library/best-practices-for-mitigating-insider-threat-lessons-learned-from-250-cases/</loc></url><url><loc>https://www.sei.cmu.edu/library/rid-ietf-draft-update-november-2004/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/extended-incident-handling-working-group-inch-march-2005/</loc><lastmod>2026-04-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/pay-attention-what-are-your-employees-doing/</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/iodef-data-model-status-march-2005/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/phishing-reports-using-the-inch-format/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/inch-requirements-march-2005/</loc><lastmod>2026-04-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/rid-ietf-draft-update-march-2005/</loc><lastmod>2026-04-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/risk-mitigation-strategies-lessons-learned-from-actual-insider-attacks/</loc></url><url><loc>https://www.sei.cmu.edu/library/extended-incident-handling-working-group-inch-agenda/</loc><lastmod>2026-04-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/iodef-data-model-status-progress-from-03/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insider-threats-in-the-sdlc-lessons-learned-from-actual-incidents-of-fraud-theft-of-sensitive-information-and-it-sabotage/</loc></url><url><loc>https://www.sei.cmu.edu/library/inch-requirements-july-2005/</loc><lastmod>2026-04-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/rid-ietf-draft-update-august-2005/</loc><lastmod>2026-04-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-soap-transport-for-rid-new-draft/</loc></url><url><loc>https://www.sei.cmu.edu/library/extended-incident-handling-working-group-inch-november-2005/</loc><lastmod>2026-04-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/iodef-data-model-status-progress-from-04/</loc></url><url><loc>https://www.sei.cmu.edu/library/rid-ietf-draft-update-november-2005/</loc><lastmod>2026-04-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-soap-transport-for-rid-draft-moriarty-soap-01/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/extended-incident-handling-working-group-inch-july-2004/</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/iodef-data-model-status-june-2004/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/rid-ietf-draft-update-june-2004-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/vulnerability-and-exploit-description-and-exchange-format-vedef/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-key-to-successful-monitoring-for-detection-of-insider-attacks/</loc></url><url><loc>https://www.sei.cmu.edu/library/risk-and-resilience-considerations-for-information-security-risk-assessment-and-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-measurement-and-analysis/</loc><lastmod>2024-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-cert-top-10-list-for-winning-the-battle-against-insider-threats/</loc></url><url><loc>https://www.sei.cmu.edu/library/combat-it-sabotage-technical-solutions-from-the-cert-insider-threat-lab/</loc></url><url><loc>https://www.sei.cmu.edu/library/tutorial-cloud-computing-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/rid-implementation-report/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/inch-extensions-for-phishing/</loc><lastmod>2026-04-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/iodef-extensions-for-phishing-and-other-e-crimeware/</loc></url><url><loc>https://www.sei.cmu.edu/library/iodef-experience-in-jpcertcc/</loc><lastmod>2024-02-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-in-c-and-c-a-look-at-common-vulnerabilities/</loc></url><url><loc>https://www.sei.cmu.edu/library/best-practices-for-secure-coding/</loc></url><url><loc>https://www.sei.cmu.edu/library/ietf-inch-working-group-meeting/</loc><lastmod>2024-01-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/information-compliance-overload-dealing-with-a-growing-corporate-legal-nightmare/</loc><lastmod>2024-06-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mission-thread-workshop-mtw-preparation-and-execution/</loc></url><url><loc>https://www.sei.cmu.edu/library/governing-for-enterprise-security-an-implementation-guide/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-art-of-information-security-governance/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-architecture-centric-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/system-of-systems-quality-attribute-specification-and-architecture-evaluation/</loc></url><url><loc>https://www.sei.cmu.edu/library/governing-for-enterprise-security-presentation/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/information-security-as-an-institutional-priority/</loc></url><url><loc>https://www.sei.cmu.edu/library/trends-in-the-law-of-information-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/focus-on-resiliency-a-process-oriented-approach-to-security/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mission-assurance-analysis-protocol-maap/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-challenges-of-security-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/setting-the-scene-in-vulnerability-discourse/</loc></url><url><loc>https://www.sei.cmu.edu/library/zero-knowledge-fuzzing/</loc></url><url><loc>https://www.sei.cmu.edu/library/effective-fuzzing-strategies/</loc></url><url><loc>https://www.sei.cmu.edu/library/realizing-the-fuzzing-potential-precision-and-accuracy-vs-coverage/</loc></url><url><loc>https://www.sei.cmu.edu/library/instrumented-fuzz-testing-using-air-integers-presentation/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2010-proceedings/</loc><lastmod>2023-10-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-maze-of-twisty-passages-all-alike-a-bottom-up-exploration-of-open-source-fuzzing-tools-and-frameworks/</loc></url><url><loc>https://www.sei.cmu.edu/library/2011-cybersecurity-watch-survey-presentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-slas-managing-requirements-at-arms-length/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/principles-for-establishing-a-practical-cyber-security-incident-management-process-in-your-hie/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/navigating-the-waters-of-incident-response-and-recovery/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/pennsylvanias-journey-for-health-information-exchange/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/quilt-a-system-for-distributed-queries-of-security-relevant-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/data-needs-for-network-security-metrics-a-measure-and-manage-approach/</loc></url><url><loc>https://www.sei.cmu.edu/library/capture-the-flag-data-capture-experiences/</loc></url><url><loc>https://www.sei.cmu.edu/library/dns-footprint-of-malware/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-monitoring-for-cyber-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/fun-with-flow/</loc></url><url><loc>https://www.sei.cmu.edu/library/analytical-evaluation-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-security-into-closed-network-design/</loc></url><url><loc>https://www.sei.cmu.edu/library/understanding-the-drivers-behind-software-acquisition-program-performance/</loc><lastmod>2024-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/modeling-the-evolution-of-a-science-project-in-software-reliant-system-acquisition-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/2012-cybersecurity-watch-survey-presentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/2013-state-of-cybercrime-survey-presentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/2013-state-of-cybercrime-survey-press-release/</loc></url><url><loc>https://www.sei.cmu.edu/library/cmmi-version-12-overview/</loc></url><url><loc>https://www.sei.cmu.edu/library/working-with-rose/</loc></url><url><loc>https://www.sei.cmu.edu/library/does-scale-really-matter-ultra-large-scale-systems-seven-years-after-the-study/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cultural-markers-in-attack-attribution/</loc><lastmod>2024-06-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cultural-and-computer-network-attack-cna-behaviors-44con-london/</loc></url><url><loc>https://www.sei.cmu.edu/library/new-statistical-measures-for-network-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/adding-network-flow-analysis-to-your-security-architecture/</loc><lastmod>2024-06-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tralse-positive/</loc></url><url><loc>https://www.sei.cmu.edu/library/anomaly-based-botserver-detection/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-in-the-presales-process/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/approaching-security-from-an-architecture-first-perspective/</loc></url><url><loc>https://www.sei.cmu.edu/library/distributed-summary-statistics-with-bro/</loc><lastmod>2025-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/data-fusion-at-scale/</loc></url><url><loc>https://www.sei.cmu.edu/library/streaming-analysis-an-alternate-analysis-paradigm/</loc></url><url><loc>https://www.sei.cmu.edu/library/analysis-of-some-time-series-metrics-for-network-monitoring/</loc></url><url><loc>https://www.sei.cmu.edu/library/pcr-a-flow-metric-for-the-producerconsumer-relationship/</loc></url><url><loc>https://www.sei.cmu.edu/library/analyzing-flow-using-encounter-complexes/</loc></url><url><loc>https://www.sei.cmu.edu/library/passive-detection-of-misbehaving-name-servers-3/</loc><lastmod>2024-02-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/network-flow-metadata-very-large-scale-processing-with-argus/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-analysis-with-silk/</loc></url><url><loc>https://www.sei.cmu.edu/library/advanced-silk-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-flows-past-present-and-future/</loc></url><url><loc>https://www.sei.cmu.edu/library/semantic-flow-augmentation-for-the-automated-discovery-of-organizational-relationships/</loc><lastmod>2024-04-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/investigating-apt1/</loc><lastmod>2024-02-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/pm-win-t-tmd-fight-the-network-ftn-fava/</loc></url><url><loc>https://www.sei.cmu.edu/library/logstash-yes-logging-can-be-awesome/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-onion-peel-back-the-layers-of-your-network-in-minutes/</loc><lastmod>2023-10-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/voip-in-flow/</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/10-years-of-flocon/</loc></url><url><loc>https://www.sei.cmu.edu/library/passive-dns-collection-and-analysis-the-dnstap-approach/</loc></url><url><loc>https://www.sei.cmu.edu/library/setting-up-a-network-flow-sensor-for-100/</loc></url><url><loc>https://www.sei.cmu.edu/library/argus-with-netmap-monitoring-traffic-at-10gbitss-line-rate-using-commodity-hardware/</loc><lastmod>2024-02-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/analyzing-large-flow-data-sets-using-modern-open-source-data-search-and-visualization-tools/</loc></url><url><loc>https://www.sei.cmu.edu/library/quilt-a-system-for-distributed-temporal-queries-of-security-relevant-heterogeneous-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-security-monitoring-with-ipfix-and-bro/</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/stucco-situation-and-threat-understanding-by-correlating-contextual-observations/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/why-cant-johnny-program-securely/</loc><lastmod>2024-04-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dont-be-pwned-a-short-course-on-secure-programming-in-java-2/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/java-security-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/as-if-infinitely-ranged-integer-model-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/android-taint-flow-analysis-for-app-sets-2/</loc><lastmod>2024-05-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/implementation-of-the-tsp-in-small-and-medium-size-software-enterprises/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-star-is-made-attaining-excellence-through-deliberate-practice/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/keynote-the-sei-a-focus-on-process/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-large-system-problem/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/keynote-address-team-software-process-2009/</loc></url><url><loc>https://www.sei.cmu.edu/library/bringing-science-for-high-maturity-practices-with-psptsp/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tsp-and-secure-coding/</loc><lastmod>2023-09-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/accelerating-cmmi-adoption-with-psptsp-tcaim/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/certifying-software-organizations/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-victim-trap/</loc></url><url><loc>https://www.sei.cmu.edu/library/uses-of-monte-carlo-simulation-for-tsp-team/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/lessons-learned-in-sei-blended-learning/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-do-you-bring-process-discipline-to-a-team/</loc><lastmod>2024-03-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dealing-with-resistance-tools-of-the-change-warrior/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/accelerating-cmmi-adoption-with-psptsp/</loc></url><url><loc>https://www.sei.cmu.edu/library/deploying-tsp-to-a-nation-early-results-from-mexico/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/making-tsp-work-at-cmmi-level-5/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-teacher-the-bathtub-and-the-bureaucrat/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecting-high-quality-software-the-role-of-software-architecture-in-system-development-and-evolution/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-unit-testing-and-the-tsp/</loc></url><url><loc>https://www.sei.cmu.edu/library/misc-pmt-combining-tsp-and-cmmi-should-mean-more-than-just-an-anagram/</loc></url><url><loc>https://www.sei.cmu.edu/library/mining-psp-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/impact-of-individual-performance-to-project-organization/</loc></url><url><loc>https://www.sei.cmu.edu/library/scaling-up-the-process/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/extending-the-team-software-process-for-systems-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/tools-of-the-change-warrior/</loc></url><url><loc>https://www.sei.cmu.edu/library/neuroscience-zen-and-the-art-of-coaching-for-habitual-excellence/</loc></url><url><loc>https://www.sei.cmu.edu/library/toward-a-quantified-reflection/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-interactive-session-empirical-study-of-software-engineering-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-and-deliberate-practice-as-tools-for-improved-capability-in-the-workforce/</loc></url><url><loc>https://www.sei.cmu.edu/library/analysis-of-code-defect-injection-and-removal-in-psp/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-is-coming/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-architects-point-of-view-on-tsp/</loc></url><url><loc>https://www.sei.cmu.edu/library/failure-is-not-an-option/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-psp-analysis-of-defects-injected-during-detailed-design/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/coaching-teams-the-soft-side-of-tsp/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-on-an-architecture-driven-project/</loc></url><url><loc>https://www.sei.cmu.edu/library/2014-state-of-cybercrime-survey-presentation/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-plays-the-ace-using-architecture-centric-engineering-on-a-tsp-project/</loc></url><url><loc>https://www.sei.cmu.edu/library/illuminating-the-intersection-of-tsp-and-cmmi-high-maturity-process-performance-models/</loc><lastmod>2024-02-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/achieving-academic-success-using-tsp/</loc><lastmod>2024-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/lessons-learned-using-agile-methods-with-tsp/</loc></url><url><loc>https://www.sei.cmu.edu/library/changing-behavior-the-key-to-adoption-of-complex-process-technology/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/verifying-periodic-real-time-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/scada-resilience-via-autonomous-cyber-physical-agents/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/collaborative-autonomy-with-group-autonomy-for-mobile-systems-gams/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/modeling-sustainment-dynamics/</loc><lastmod>2024-01-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/eliciting-unstated-requirements/</loc></url><url><loc>https://www.sei.cmu.edu/library/design-research-in-the-context-of-federal-law-enforcement-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/abuse-of-cpe-devices-and-recommended-fixes/</loc></url><url><loc>https://www.sei.cmu.edu/library/quantifying-the-effectiveness-of-systems-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-business-case-for-systems-engineering-comparison-of-defense-domain-and-non-defense-projects-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-incremental-life-cycle-assurance-strategy-for-critical-system-certification/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-best-practices-for-project-and-technical-leaders/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-zero-depth-entry-to-using-tsp-how-tsp-turned-around-the-smart-grid-maturity-model-project/</loc></url><url><loc>https://www.sei.cmu.edu/library/common-system-and-software-testing-pitfalls-2014/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threats-in-the-software-development-life-cycle/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-software-product-lines/</loc></url><url><loc>https://www.sei.cmu.edu/library/sempre-the-tsp-software-engineering-measured-performance-repository/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-pace-process-and-capability-evaluation-an-experience-report/</loc></url><url><loc>https://www.sei.cmu.edu/library/information-flow-the-secret-to-successful-teamwork/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/graphical-recordings-of-the-tsp-symposium/</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/network-flow-analysis-at-scinet/</loc><lastmod>2025-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/semantic-representations-of-network-flow-a-proposed-standard-with-the-what-the-why-and-the-how/</loc></url><url><loc>https://www.sei.cmu.edu/library/discrete-mathematical-approaches-to-traffic-graph-analysis/</loc><lastmod>2023-10-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/finding-a-needle-in-a-pcap/</loc></url><url><loc>https://www.sei.cmu.edu/library/elasticsearch-logstash-and-kibana-elk/</loc></url><url><loc>https://www.sei.cmu.edu/library/toa-a-web-based-netflow-data-network-monitoring-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/advances-in-semantically-augmented-flow-data-for-dynamic-impact-assessment-response-selection-and-alert-prioritization/</loc></url><url><loc>https://www.sei.cmu.edu/library/locality-a-semi-formal-flow-dimension/</loc></url><url><loc>https://www.sei.cmu.edu/library/encounter-complexes-for-clustering-network-flow/</loc></url><url><loc>https://www.sei.cmu.edu/library/modeling-the-active-and-idle-durations-of-network-hosts/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-vantage-to-manage-complex-sensor-networks/</loc></url><url><loc>https://www.sei.cmu.edu/library/indicator-expansion-with-analysis-pipeline/</loc></url><url><loc>https://www.sei.cmu.edu/library/ssh-compromise-detection-using-netflowipfix/</loc></url><url><loc>https://www.sei.cmu.edu/library/monitoring-virtual-networks/</loc></url><url><loc>https://www.sei.cmu.edu/library/streamworks-a-system-for-real-time-graph-pattern-matching-on-network-traffic/</loc></url><url><loc>https://www.sei.cmu.edu/library/approaching-intelligent-analysis-for-attribution-and-tracking-the-lifecycle-of-threats/</loc></url><url><loc>https://www.sei.cmu.edu/library/creating-preventive-digital-forensics-systems-to-proactively-resolve-computer-security-incidents-in-organizations/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-flow-analysis-in-information-security-strategy/</loc></url><url><loc>https://www.sei.cmu.edu/library/flow-storage-revisited-is-it-time-to-re-architect-flow-storage-and-processing-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/enterprise-data-storage-and-analysis-on-apache-spark/</loc></url><url><loc>https://www.sei.cmu.edu/library/graph-based-role-mining-techniques-for-cyber-security/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/increasing-the-insight-from-network-flows-connecting-science-to-operational-reality/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-ieee-cybersecurity-initiative-accelerating-innovation-in-security-privacy-technologies-presentation/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/open-systems-architecture-progress-and-challenges-saturn-2015/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/locating-the-architectural-roots-of-technical-debt/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-architectural-analysis-for-security-aafs-method/</loc></url><url><loc>https://www.sei.cmu.edu/library/when-and-where-to-apply-the-family-of-architecture-centric-methods/</loc></url><url><loc>https://www.sei.cmu.edu/library/add-30-rethinking-drivers-and-decisions-in-the-design-process/</loc><lastmod>2024-02-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/smart-decisions-an-architecture-design-game/</loc></url><url><loc>https://www.sei.cmu.edu/library/empirical-evaluation-of-api-usability-and-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/argus-instrumentation-of-the-gloriad-re-network-for-improved-measurement-monitoring-and-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/anomaly-sampling-bringing-diversity-to-network-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-didfail-to-analyze-flow-of-sensitive-information-in-sets-of-android-apps/</loc></url><url><loc>https://www.sei.cmu.edu/library/video-games-as-a-training-tool-to-prepare-the-next-generation-of-cyber-warriors/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/systemic-vulnerabilities-an-allegorical-tale-of-steampunkvulnerability-to-aero-physical-threats/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/vulnerability-coordination-and-concurrency/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-we-discovered-thousands-of-vulnerable-android-apps-in-1-day/</loc></url><url><loc>https://www.sei.cmu.edu/library/vrdx-sig-global-vulnerability-identification/</loc></url><url><loc>https://www.sei.cmu.edu/library/nist-cybersecurity-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-research-review-2015-cto-opening-remarks/</loc></url><url><loc>https://www.sei.cmu.edu/library/acquisition-management-session-opening-remarks/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-in-government-validating-success-enablers-and-inhibitors/</loc></url><url><loc>https://www.sei.cmu.edu/library/machine-learning-for-big-data-systems-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/quantifying-uncertainty-for-early-lifecycle-cost-estimationfy15-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/improving-software-sustainability-through-data-driven-technical-debt-management/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/assured-design-session-opening-remarks/</loc></url><url><loc>https://www.sei.cmu.edu/library/effective-reduction-of-avoidable-complexity-in-embedded-systems-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/open-source-aadl-workbench-for-virtual-system-integration/</loc></url><url><loc>https://www.sei.cmu.edu/library/extending-aadl-for-security-design-assurance-of-the-internet-of-things/</loc><lastmod>2024-07-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/increase-adoption-of-secure-coding-standards/</loc></url><url><loc>https://www.sei.cmu.edu/library/graph-algorithms-on-future-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/c4i-session-opening-remarks/</loc></url><url><loc>https://www.sei.cmu.edu/library/edge-enabled-tactical-systems-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/effecting-large-scale-adaptive-swarms-through-intelligent-collaboration/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/human-factors-session-opening-remarks/</loc></url><url><loc>https://www.sei.cmu.edu/library/generalized-automated-cyber-readiness-evaluator/</loc><lastmod>2023-10-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/human-computer-decision-systems-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-mitigation/</loc><lastmod>2024-06-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/verification-and-validation-session-opening-remarks/</loc><lastmod>2024-06-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/parallel-software-model-checking/</loc></url><url><loc>https://www.sei.cmu.edu/library/runtime-assurance-for-big-data-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/incremental-lifecycle-assurance-of-critical-systems-2015/</loc><lastmod>2024-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/verifying-distributed-adaptive-real-time-dart-systems/</loc><lastmod>2024-02-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-session-opening-remarks/</loc></url><url><loc>https://www.sei.cmu.edu/library/design-pattern-recovery-from-malware-binaries/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/api-usability-and-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/vulnerability-discovery-2015/</loc></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-via-signaling-games/</loc><lastmod>2024-04-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/designing-the-infrastructure-for-an-enterprise-it-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/edge-analytics-analysis-of-social-media-to-support-tactical-users/</loc></url><url><loc>https://www.sei.cmu.edu/library/providing-information-superiority-to-small-tactical-units/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/engineering-high-assurance-software-for-distributed-adaptive-real-time-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/elicitation-of-unstated-needs/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-joint-fire-science-program-jfsp-and-the-interagency-fuels-treatment-decision-support-system-iftdss/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/intellectual-property-rights-why-you-should-care-and-how-to-manage-them/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-case-study-experiences-with-agile-and-lean-principles/</loc></url><url><loc>https://www.sei.cmu.edu/library/keynote-sei-research-program/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/from-virtual-system-integration-to-incremental-lifecycle-assurance/</loc></url><url><loc>https://www.sei.cmu.edu/library/common-system-and-software-testing-pitfalls/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/paying-due-diligence-to-software-architecture-in-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/sos-architectures-identifying-architecture-engineering-and-capability-challenges-early-in-the-lifecycle/</loc></url><url><loc>https://www.sei.cmu.edu/library/implementing-product-development-flow-the-key-to-managing-large-scale-agile-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-defect-prioritization-method-based-on-the-risk-priority-number-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/measurement-and-analysis-in-the-real-world-tools-for-cleaning-messy-data/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/scaling-agile-methods-for-major-defense-programs-frameworks-and-methods-in-use-today/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-systematic-method-for-big-data-technology-selection/</loc></url><url><loc>https://www.sei.cmu.edu/library/tactical-cloudlets-moving-cloud-computing-to-the-tactical-edge/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dashing-all-the-way-defining-the-best-dashboard-for-your-program/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/what-happens-and-how-analyzing-the-results-of-13-acquisition-program-assessments/</loc><lastmod>2025-06-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/government-as-the-integrator-why-why-not-and-how/</loc></url><url><loc>https://www.sei.cmu.edu/library/technical-debt-why-should-you-care/</loc></url><url><loc>https://www.sei.cmu.edu/library/performance-metrics-that-matter-eliminating-surprises-in-agile-projects/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/managing-software-and-system-complexity/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-secure-software-for-mission-critical-systems-2015/</loc></url><url><loc>https://www.sei.cmu.edu/library/open-systems-architecture-progress-and-challenges/</loc></url><url><loc>https://www.sei.cmu.edu/library/contracting-officers-representative-cor-interactive-sharepoint-wiki/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/busting-silos-red-tape-devops-in-federal-government/</loc></url><url><loc>https://www.sei.cmu.edu/library/moving-to-the-ic-cloud/</loc></url><url><loc>https://www.sei.cmu.edu/library/experiences-in-migrations-of-legacy-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/keynote-speed-with-discipline/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/keynote-gaps-in-science-and-technology-activities-for-the-it-acquisition-of-business-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/keynote-a-case-study-of-toyota-unintended-acceleration-and-software-safety/</loc></url><url><loc>https://www.sei.cmu.edu/library/suricata-tutorial/</loc></url><url><loc>https://www.sei.cmu.edu/library/capturing-and-processing-one-million-network-flows-per-second-with-silk-challenges-and-strategies/</loc></url><url><loc>https://www.sei.cmu.edu/library/minimizing-the-gaps-with-bro-grr-and-elk-brogrrelk/</loc></url><url><loc>https://www.sei.cmu.edu/library/netflow-analysis-intrusion-detection-protection-and-usage-reporting/</loc></url><url><loc>https://www.sei.cmu.edu/library/network-security-analytics-hpc-platforms-hadoop-and-graphs-oh-my/</loc><lastmod>2025-05-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-meaningful-metric-for-ipv4-addresses/</loc></url><url><loc>https://www.sei.cmu.edu/library/better-reporting-guidelines-for-better-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/command-and-control-mechanism-trends-in-exploit-kits-rats-apts-and-other-malware/</loc></url><url><loc>https://www.sei.cmu.edu/library/detecting-traffic-to-recently-unparked-domains-with-analysis-pipeline/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/distributed-sensor-data-contextualization-at-scale-for-threat-intelligence-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/gosh-wow-volusia-networks/</loc></url><url><loc>https://www.sei.cmu.edu/library/graph-analysis-techniques-for-network-flow-records-using-open-cyber-ontology-group-ocog-format/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/intelligence-driven-malware-analysis-idma-malicious-profiling/</loc></url><url><loc>https://www.sei.cmu.edu/library/making-the-most-of-a-lot-of-data-netflow-in-us-cert-operations/</loc></url><url><loc>https://www.sei.cmu.edu/library/keynote-achieving-a-secure-and-resilient-cyber-ecosystem-a-way-ahead/</loc></url><url><loc>https://www.sei.cmu.edu/library/merging-network-configuration-and-network-traffic-data-in-isp-level-analyses/</loc></url><url><loc>https://www.sei.cmu.edu/library/monitoring-and-classification-of-active-ipv6-addresses/</loc></url><url><loc>https://www.sei.cmu.edu/library/netflow-in-daily-information-security-operations/</loc><lastmod>2024-03-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/network-monitoring-and-deceptive-defenses/</loc></url><url><loc>https://www.sei.cmu.edu/library/new-dns-traffic-analysis-techniques-to-identify-global-internet-threats/</loc></url><url><loc>https://www.sei.cmu.edu/library/planning-curricula-for-the-network-traffic-analyst-of-2018-2020/</loc></url><url><loc>https://www.sei.cmu.edu/library/role-model-transformations-for-flow-analysis-in-cyberdefense/</loc></url><url><loc>https://www.sei.cmu.edu/library/towards-100-gbit-flow-based-network-monitoring/</loc></url><url><loc>https://www.sei.cmu.edu/library/situational-awareness-threat-report-satr/</loc><lastmod>2025-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-domain-name-registrant-information-to-identify-malicious-domains/</loc><lastmod>2025-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/network-traffic-analysis-silk/</loc></url><url><loc>https://www.sei.cmu.edu/library/measuring-what-matters/</loc></url><url><loc>https://www.sei.cmu.edu/library/reflections-on-software-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-bff-from-start-to-poc/</loc></url><url><loc>https://www.sei.cmu.edu/library/driving-efficiencies-into-the-software-life-cycle-for-army-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/unleashing-your-inner-code-warrior/</loc></url><url><loc>https://www.sei.cmu.edu/library/strengthening-the-cyber-ecosystem/</loc></url><url><loc>https://www.sei.cmu.edu/library/common-exploits-and-how-to-prevent-them/</loc></url><url><loc>https://www.sei.cmu.edu/library/auto-active-verification-of-software-with-timers-and-clocks-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-assurance-of-security-policy-enforcement-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/evaluation-of-threat-modeling-methodologies-2/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/incremental-lifecycle-assurance-of-critical-systems-2/</loc><lastmod>2023-10-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/property-directed-test-case-generation-2/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-technical-debt-to-improve-software-sustainability-and-find-software-vulnerabilities/</loc><lastmod>2024-01-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/verifying-dart-systems/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/enabling-evidence-based-modernization-2/</loc><lastmod>2024-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/semiconductor-foundry-verification-2/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tactical-analytics-2/</loc><lastmod>2024-03-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tactical-computing-and-communications/</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-code-repair-3/</loc><lastmod>2024-05-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/establishing-coding-requirements-for-non-safety-critical-c-systems/</loc><lastmod>2024-05-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/prioritizing-alerts-from-static-analysis-with-classification-models-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/vulnerability-discovery-2/</loc><lastmod>2024-01-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/experiences-developing-an-ibm-watson-cognitive-processing-application/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphblas-a-programming-specification-for-graph-analysis/</loc><lastmod>2024-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/human-computer-decision-systems-for-cybersecurity/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/multi-agent-decentralized-planning-for-adversarial-robotic-teams-2/</loc><lastmod>2024-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/supporting-software-engineering-best-practices-in-additive-manufacturing/</loc><lastmod>2024-06-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/statistical-model-checking-for-swarms-2/</loc><lastmod>2023-10-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-critical-role-of-positive-incentives-in-reducing-insider-threat/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/why-did-the-robot-do-that-2/</loc><lastmod>2024-02-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/workplace-violence-and-it-sabotage-two-sides-of-the-same-coin/</loc><lastmod>2024-03-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/generalized-automated-cyber-readiness-evaluation/</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/leveraging-serious-games-to-assist-motivation-and-education/</loc><lastmod>2024-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-scorecard-for-cyber-resilience-what-we-have-observed/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/data-science-what-it-is-and-how-it-can-help-your-company/</loc></url><url><loc>https://www.sei.cmu.edu/library/temporal-protection-in-real-time-system/</loc><lastmod>2023-11-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/beyond-errno-error-handling-in-c/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/inside-the-cert-oracle-secure-coding-standard-for-java/</loc></url><url><loc>https://www.sei.cmu.edu/library/exploiting-java-serialization-for-fun-and-profit/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-java-security-architecture-how-and-why/</loc></url><url><loc>https://www.sei.cmu.edu/library/construction-and-implementation-of-cert-secure-coding-rules-improving-automation-of-secure-coding/</loc><lastmod>2023-09-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/avoiding-insecure-c/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measure-it-manage-it-ignore-it-software-practitioners-and-technical-debt-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/got-technical-debt-surfacing-elusive-technical-debt-in-issue-trackers-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-malware-analysis-to-identify-overlooked-security-requirements-more/</loc></url><url><loc>https://www.sei.cmu.edu/library/panel-secure-software-workforce-development-panel-session/</loc></url><url><loc>https://www.sei.cmu.edu/library/managing-technical-debt-in-software-engineering-2/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/deriving-the-average-case-performance-of-bandwidth-like-interfaces-for-tasksets-with-infinite-minimum-inter-arrival-time-equal-task-density-uniformly-distributed-deadlines-and-infinite-number-of-tasks/</loc></url><url><loc>https://www.sei.cmu.edu/library/assurance-cases-and-confidence/</loc><lastmod>2023-10-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-value-of-tsp-in-agile-practices/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-open-licensing/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-secure/</loc></url><url><loc>https://www.sei.cmu.edu/library/welcome-and-agenda-tsp-community-of-practice-workshop-2016/</loc></url><url><loc>https://www.sei.cmu.edu/library/session-outbrief-the-value-of-tsp-in-agile-practices/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/lightning-talk-tsppsp-activity-subsets-and-their-influence-on-team-performance/</loc></url><url><loc>https://www.sei.cmu.edu/library/lightning-talk-the-value-of-tsp-in-agile-practices/</loc></url><url><loc>https://www.sei.cmu.edu/library/lightning-talk-tooling-for-agile-outreach/</loc></url><url><loc>https://www.sei.cmu.edu/library/lightning-talk-beyond-the-agile-manifesto/</loc></url><url><loc>https://www.sei.cmu.edu/library/lightning-talk-an-innovative-cloud-process-with-the-tsp/</loc></url><url><loc>https://www.sei.cmu.edu/library/lightning-talk-four-messages-that-work/</loc></url><url><loc>https://www.sei.cmu.edu/library/design-and-implementation-of-the-graphblas-template-library-gbtl/</loc></url><url><loc>https://www.sei.cmu.edu/library/struggles-at-the-frontiers-persistent-pursuit-of-software-assurance-in-the-development-and-sustainment-of-defense-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-relationship-between-design-flaws-and-software-vulnerabilities-a-technical-debt-perspective/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-tale-of-two-agile-programs/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/6-things-you-need-to-know-about-data-governance/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-malware-analysis-to-identify-overlooked-security-requirements/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-project-success-and-failure-the-story-of-the-fbi-sentinel-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/toward-successfully-navigating-large-scale-it-modernization-efforts/</loc></url><url><loc>https://www.sei.cmu.edu/library/applied-machine-learning-in-software-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-in-government-a-research-agenda-for-agile-software-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/methodology-for-comparing-cloud-service-offerings/</loc></url><url><loc>https://www.sei.cmu.edu/library/methodology-for-the-cost-benefit-analysis-of-a-large-scale-multi-phasic-software-enterprise-migration/</loc></url><url><loc>https://www.sei.cmu.edu/library/temporal-partitioning-and-verification-in-distributed-cyber-physical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/measuring-complexity-for-system-safety-assurance/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/security-measurement-establishing-confidence-that-security-is-sufficient/</loc></url><url><loc>https://www.sei.cmu.edu/library/improvements-in-safety-analysis-for-safety-critical-software-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-does-software-cost-so-much-toward-a-causal-model-march-2017/</loc></url><url><loc>https://www.sei.cmu.edu/library/risks-in-the-software-supply-chain/</loc></url><url><loc>https://www.sei.cmu.edu/library/replacing-promises-with-data-a-structured-way-to-assess-software-health/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-to-minimize-configuration-switching-time-and-cost-for-design-of-experiments/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-tactical-cloudlets-for-mission-support-at-the-edge/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-secure-software-for-mission-critical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/nationwide-it-a-software-process-improvement-journey/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/panel-software-sustainment-continuous-engineering-to-deliver-warfighter-capability/</loc></url><url><loc>https://www.sei.cmu.edu/library/so-much-money-for-so-little-capability-the-reality-of-sustaining-dod-software-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/harry-a-lee/</loc><lastmod>2024-08-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/keynote-learning-to-drive-a-car-at-the-us-census-bureau/</loc><lastmod>2024-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/keynote-a-perspective-on-military-software-needs/</loc></url><url><loc>https://www.sei.cmu.edu/library/thinking-about-intrusion-kill-chains-as-mechanisms/</loc></url><url><loc>https://www.sei.cmu.edu/library/django-twitter-bootstrap-in-the-workplace-build-em-fast-and-furious/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-api-to-filter-network-flows-in-the-web-to-use-as-plugin-in-web-based-network-visualization-apps/</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ddos-defense-for-a-community-of-peers/</loc></url><url><loc>https://www.sei.cmu.edu/library/backbone-network-drdos-attack-monitoring-and-analysis/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/i-want-your-flows-to-be-lies/</loc><lastmod>2024-07-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/detecting-threats-not-sandboxes/</loc><lastmod>2024-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-flow-for-realtime-traffic-management-in-100g-networks/</loc></url><url><loc>https://www.sei.cmu.edu/library/finding-the-needle-in-the-haystack/</loc><lastmod>2025-05-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/silkweb-analyze-silk-data-through-api-and-javascript-frameworks/</loc></url><url><loc>https://www.sei.cmu.edu/library/navigating-the-pitfalls-and-promises-of-network-security-monitoring-nsm/</loc></url><url><loc>https://www.sei.cmu.edu/library/threat-modeling-and-risk-analysis-for-developers-and-testers/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/assessing-targeted-attacks-in-incident-response-threat-correlation/</loc></url><url><loc>https://www.sei.cmu.edu/library/mothra-a-large-scale-data-processing-platform-for-network-security-analysis/</loc><lastmod>2024-07-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flow-based-monitoring-troubleshooting-and-security-using-nprobe/</loc><lastmod>2024-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/what-do-systems-engineers-need-to-know-about-software/</loc><lastmod>2024-07-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/applied-machine-learning-in-software-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/data-science-tutorial/</loc></url><url><loc>https://www.sei.cmu.edu/library/three-secrets-to-successful-agile-metrics/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/four-valuable-data-sources-for-network-security-analytics/</loc></url><url><loc>https://www.sei.cmu.edu/library/hands-on-tutorial-auditing-static-analysis-alerts-using-a-lexicon-and-rules/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-game-theoretic-approach-to-optimizing-behaviors-in-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-assurance-of-security-policy-enforcement-2017-2/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/authentication-and-authorization-for-internet-of-things-iot-devices-in-edge-environments/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-code-generation-for-high-performance-graph-libraries/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/certifiable-distributed-runtime-assurance-3/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-affordance-visualization-in-augmented-reality-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/dynamic-design-analysis-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/events-relationships-and-script-learning-for-situational-awareness-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/foundations-for-summarizing-and-learning-latent-structure-in-video-2/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/guided-architecture-trade-space-exploration-for-safety-critical-software-systems-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/inference-of-memory-bounds-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/measuring-performance-of-big-learning-workloads-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/micro-expressions-more-than-meets-the-eye-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/obsidian-a-safer-blockchain-programming-language-3/</loc></url><url><loc>https://www.sei.cmu.edu/library/rapid-expansion-of-classification-models-to-prioritize-static-analysis-alerts-for-c-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/technical-debt-analysis-through-software-analytics-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/technical-detection-of-intended-violence-against-self-or-others-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-will-the-robot-do-next-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-does-software-cost-so-much-towards-a-causal-model-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/ffrdcs-a-primer-federally-funded-research-and-development-centers-in-the-21st-century/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/master-of-software-engineering-curriculum-presentation-to-faculty/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-hygiene-a-baseline-set-of-practices/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-driven-insider-threat-control-selection-and-deployment/</loc></url><url><loc>https://www.sei.cmu.edu/library/leveraging-systems-engineering-to-improve-project-performance/</loc></url><url><loc>https://www.sei.cmu.edu/library/big-data-platform/</loc></url><url><loc>https://www.sei.cmu.edu/library/creating-sharing-value-with-network-activity-threat-correlation/</loc></url><url><loc>https://www.sei.cmu.edu/library/optimal-machine-learning-algorithms/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/anomaly-detection-in-cyber-networks-using-graph-node-role-dynamics-and-netflow-bayesian-normalcy-modeling/</loc></url><url><loc>https://www.sei.cmu.edu/library/when-threat-hunting-fails-identifying-malvertising-domains-using-lexical-clustering/</loc></url><url><loc>https://www.sei.cmu.edu/library/analysis-of-dns-traffic-on-the-network-edge-and-in-motion/</loc></url><url><loc>https://www.sei.cmu.edu/library/detecting-malicious-ips-and-domain-names-by-fusing-threat-feeds-and-passive-dns-through-graph-inference/</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insight2-an-interactive-web-based-platform-for-modeling-and-analysis-of-large-scale-argus-network-flow-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/identification-of-malicious-ssl-networks-by-subgraph-anomaly-detection/</loc></url><url><loc>https://www.sei.cmu.edu/library/threat-hunting-for-lateral-movement/</loc></url><url><loc>https://www.sei.cmu.edu/library/anomaly-detection-in-bipartite-networks/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/eliminating-barriers-to-automated-tensor-analysis-for-large-scale-flows/</loc><lastmod>2023-10-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/multi-dimensional-network-anomaly-detection-with-machine-learning/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-detection-and-analysis-of-iot-network-traffic-through-distributed-open-source-sensors-and-citizen-scientists/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cygraph-big-data-graph-analysis-for-cybersecurity-and-mission-resilience/</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/analyzing-24-years-of-cvd/</loc></url><url><loc>https://www.sei.cmu.edu/library/data-driven-approach-to-ia-evaluation-design-and-documentation/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/desperately-seeking-severity/</loc><lastmod>2024-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-cost-model-and-tool-to-support-quality-economic-trade-off-decisions/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/quantifying-the-value-of-architecting-within-agile-software-development-via-technical-debt-analysis/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/oh-no-devops-is-tough-to-implement/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-not-just-for-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-software-development-cost-modeling-for-the-us-dod/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrating-the-risk-management-framework-rmf-with-devops/</loc></url><url><loc>https://www.sei.cmu.edu/library/keep-it-like-a-secret-when-android-apps-contain-private-keys/</loc></url><url><loc>https://www.sei.cmu.edu/library/challenges-and-progress-automating-static-analysis-alert-handling-with-machine-learning/</loc></url><url><loc>https://www.sei.cmu.edu/library/blockchain-your-questions-our-answers/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/smart-decisions-game-machine-learning-for-architects/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-radio-astronomer-and-an-architect-walk-into-a-bar/</loc></url><url><loc>https://www.sei.cmu.edu/library/industrial-experiences-with-automated-software-architecture-measurement/</loc></url><url><loc>https://www.sei.cmu.edu/library/digital-footprints-what-can-be-learned-from-the-traces-we-leave-on-social-networks/</loc></url><url><loc>https://www.sei.cmu.edu/library/sgmm-overview/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sgmm-navigation-process-compass-survey-workshop-template/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sgmm-navigation-process-aspirations-workshop-template/</loc><lastmod>2024-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-observations-and-reference-model-for-software-integration-labs/</loc><lastmod>2024-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2013-presentations/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2012-presentations/</loc><lastmod>2025-12-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2011-presentations/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2010-presentations/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2009-presentations/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2008-presentations/</loc><lastmod>2024-06-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2007-presentations/</loc></url><url><loc>https://www.sei.cmu.edu/library/saturn-2006-presentations/</loc></url><url><loc>https://www.sei.cmu.edu/library/next-steps-with-blockchain-technology/</loc><lastmod>2024-01-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automating-static-analysis-alert-handling-with-machine-learning-2016-2018/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-can-i-enforce-the-sei-cert-c-coding-standard-using-static-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/arbitrary-albatross-neutral-names-for-vulnerabilities/</loc></url><url><loc>https://www.sei.cmu.edu/library/assuring-non-deterministic-software-based-systems/</loc><lastmod>2024-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/continuous-iterative-development-and-deployment-practices/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/leveraging-emerging-changes-in-computing/</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/modern-software-lifecycle-practices/</loc><lastmod>2023-10-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/operational-cyber-risk-reduction/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/scaling-software-testing-and-evaluation/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-for-mission/</loc></url><url><loc>https://www.sei.cmu.edu/library/capitalizing-on-cloud-technologies/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/you-can-prove-it-with-less-data-science-tasks-using-challenge-based-acquisition/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/explainable-ai-and-human-computer-interaction/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-human-centered-design-can-help-create-dod-capability/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/building-knowledge-from-inference-logical-language-models-for-cybersecurity/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mission-capable-quantum-computing-for-software-verification-and-validation/</loc><lastmod>2024-01-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/improve-your-static-analysis-audits-using-cert-scales-new-features/</loc></url><url><loc>https://www.sei.cmu.edu/library/improved-hunt-seeding-with-specfic-anomaly-scoring/</loc><lastmod>2023-11-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-data-science-best-practices-from-the-field/</loc></url><url><loc>https://www.sei.cmu.edu/library/four-machine-learning-techniques-that-tackle-scale-and-not-just-by-increasing-accuracy/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-power-of-cyber-threat-intelligence/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-generation-and-use-of-tls-fingerprints/</loc></url><url><loc>https://www.sei.cmu.edu/library/monitoring-massive-network-traffic-using-bayesian-inference/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-generative-adversarial-networks-to-improve-phishing-domain-classifiers/</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/harvesting-logs-for-enhanced-investigations/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/network-telescopes-revisited-from-loads-of-unwanted-traffic-to-threat-intelligence/</loc></url><url><loc>https://www.sei.cmu.edu/library/simulating-your-way-to-security-one-detector-at-a-time/</loc></url><url><loc>https://www.sei.cmu.edu/library/time-based-correlation-of-malicious-events-and-their-connections/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/quantum-approach-to-inverse-malware-eradication/</loc><lastmod>2023-10-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/detecting-automatic-flows/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insight2-irnc-advanced-measurements-and-instrumentation-ami/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/backwaters-security-streaming-platform/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-cluster-testing-and-optimization/</loc></url><url><loc>https://www.sei.cmu.edu/library/impact-information-marketplace-for-policy-and-analysis-of-cyber-risk-trust/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-software-dilemma/</loc></url><url><loc>https://www.sei.cmu.edu/library/from-correlation-to-causation-lessons-for-security-defense/</loc></url><url><loc>https://www.sei.cmu.edu/library/mini-tutorial-emerging-technologies-for-software-reliant-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/multicore-processing-virtualization-and-containerization-similarities-differences-challenges-and-recommendations/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-makes-a-good-software-architect-2019-edition/</loc></url><url><loc>https://www.sei.cmu.edu/library/detecting-and-tracking-enterprise-technical-debt/</loc></url><url><loc>https://www.sei.cmu.edu/library/scaling-up-incremental-design-reviews/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-future-of-cyber-simulation/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ghosts-in-the-machine-orchestrating-a-realistic-cybersecurity-exercise-battlefield/</loc></url><url><loc>https://www.sei.cmu.edu/library/topgen-and-greybox-internet-simulation-tools/</loc></url><url><loc>https://www.sei.cmu.edu/library/scadasim-and-finsim-industrial-control-system-and-banking-simulators/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/topomojo-simple-lab-builder-and-player/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/vtunnel-and-welle-d/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-simulator-showcase-opening-remarks-presentation/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/death-by-thumb-drive/</loc></url><url><loc>https://www.sei.cmu.edu/library/us-army-combat-capabilities-development-command-armaments-center-fire-control-systems-and-technology-directorate/</loc></url><url><loc>https://www.sei.cmu.edu/library/complexity-in-a-systems-engineering-context/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-ai-to-build-more-secure-software/</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/5-guaranteed-ways-to-fail-at-cloud-migration/</loc></url><url><loc>https://www.sei.cmu.edu/library/edge-computing-use-cases-and-challenges/</loc></url><url><loc>https://www.sei.cmu.edu/library/implementing-and-updating-cloud-computing-best-practices-in-a-dynamic-industry/</loc></url><url><loc>https://www.sei.cmu.edu/library/modernizing-dod-software-production/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-hygiene-why-the-fundamentals-matter/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-series-of-unlikely-events-learning-from-sequential-behavior-for-activity-based-intelligence-and-modeling-human-expertise/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-code-repair-to-ensure-memory-safety-2019-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/causal-models-for-software-cost-prediction-and-control/</loc></url><url><loc>https://www.sei.cmu.edu/library/emotion-recognition-from-voice-in-the-wild-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/field-stripping-a-weapons-system-building-a-trustworthy-computer-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/graph-convolutional-neural-networks-3/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrated-safety-and-security-engineering-for-mission-critical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/kalki-high-assurance-software-defined-iot-security-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/projecting-quantum-computational-advantage-versus-classical-state-of-the-art-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/rapid-certifiable-trust-3/</loc></url><url><loc>https://www.sei.cmu.edu/library/rapid-construction-of-accurate-automatic-alert-handling-system-2019-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/spiralaiml-co-optimization-for-high-performance-data-intensive-computing-in-resource-constrained-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/untangling-the-knot-recommending-component-refactorings-3/</loc><lastmod>2024-06-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-all-processor-cores-while-being-confident-about-timing-3/</loc></url><url><loc>https://www.sei.cmu.edu/library/video-summarization-and-search/</loc></url><url><loc>https://www.sei.cmu.edu/library/aadl-overview-and-perspectives-2/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/welcome-to-aadl-user-day-2/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/pioneering-disruptive-real-time-softwaresystem-engineering-capability-for-army-aviation-2/</loc><lastmod>2024-07-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-open-source-aadl-tool-environment-osate/</loc></url><url><loc>https://www.sei.cmu.edu/library/aadl-is-an-integration-focal-point-2/</loc><lastmod>2024-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-use-of-acvip-containment-of-the-accumulation-of-program-technical-debt-using-aadl-implemented-on-dassault-syst%C3%A8mes-3dexperience-platform/</loc><lastmod>2023-12-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/avionics-compositional-system-of-systems-simulation-and-modeling-tool-chain-assist-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-aadl-with-the-edict-tool-suite-2/</loc><lastmod>2024-07-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/formal-behavior-verification-made-for-engineers-2/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ellidiss-aadl-tools-2/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/telecom-paris-aadl-tools-portfolio-for-real-time-systems-virtual-integration-2/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/aadl-for-dod-systems-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-driven-assurance-2/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/high-assurance-modeling-and-rapid-engineering-hamr-for-embedded-systems-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/implementing-ethics-developing-trustworthy-ai-at-pycon-2020/</loc></url><url><loc>https://www.sei.cmu.edu/library/keynote-how-to-use-hacker-personas-to-successfully-build-devsecops-pipeline/</loc></url><url><loc>https://www.sei.cmu.edu/library/exhilarating-journey-of-transformation-into-digital-edge/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-is-an-awesome-product-feature/</loc></url><url><loc>https://www.sei.cmu.edu/library/design-thinking-security-and-your-life/</loc></url><url><loc>https://www.sei.cmu.edu/library/are-we-building-just-containers-or-secure-containers/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/agile-in-government-go-for-insight-not-just-oversight/</loc></url><url><loc>https://www.sei.cmu.edu/library/ai-is-not-magic-machine-learning-for-network-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/sysflow-scalable-system-telemetry-for-improved-security-analytics-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/data-driven-security-challenges-2/</loc><lastmod>2024-02-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/bayes-at-10-gbps-identifying-malicious-and-vulnerable-processes-from-passive-traffic-fingerprinting-2/</loc><lastmod>2024-01-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/less-is-more-with-intelligent-packet-capture/</loc></url><url><loc>https://www.sei.cmu.edu/library/alchemy-stochastic-data-augmentation-for-malicious-network-traffic-detection/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/comcast-security-analytics-platform/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-long-winding-road-to-production-worthy/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-practical-decision-framework-for-implementing-evasion-resilient-host-based-analytics/</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automating-reasoning-with-attck/</loc></url><url><loc>https://www.sei.cmu.edu/library/mobile-users-susceptibility-to-phishing-attacks/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-to-use-machine-learning-for-a-phishing-incident-response/</loc></url><url><loc>https://www.sei.cmu.edu/library/methods-for-testing-and-qualifying-analytics/</loc></url><url><loc>https://www.sei.cmu.edu/library/look-ma-no-malware/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/malwares-abuse-of-privacy-enhancing-technologies/</loc></url><url><loc>https://www.sei.cmu.edu/library/code-similarity-detection-using-syntax-agnostic-locality-sensitive-hashing/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-deep-neural-networks-to-detect-compromised-hosts-in-large-scale-networks/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/threats-to-machine-learning-applications/</loc></url><url><loc>https://www.sei.cmu.edu/library/required-elements-for-constructing-a-highly-adoptable-and-adaptive-digital-forensic-model/</loc></url><url><loc>https://www.sei.cmu.edu/library/uncovering-priority-anomalies-using-pattern-discovery-as-a-roadmap-for-contextual-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/countermeasures-to-security-threats-in-networked-medical-devices/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-data-science-2020-practitioner-perspectives-and-guidance/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-ai-to-find-security-defects-in-code-build-more-secure-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/static-analysis-classification-research-fy16-20-for-software-assurance-community-of-practice/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/service-mess-to-service-mesh/</loc></url><url><loc>https://www.sei.cmu.edu/library/welcome-to-devsecops-days-dc-2020/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-need-for-threat-modeling-in-a-devsecops-world/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/delivering-devsecops-value-faster-use-metrics-and-standards/</loc><lastmod>2025-06-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/navigating-devops-requirements-with-risk-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/keynote-successful-devsecops-implementation-for-production-environments-is-a-journey-not-a-milestone/</loc></url><url><loc>https://www.sei.cmu.edu/library/evolve-your-devsecops-to-manage-speed-and-risk/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/why-organizations-need-devsecops-now-more-than-ever/</loc></url><url><loc>https://www.sei.cmu.edu/library/make-it-personal-to-make-it-happen/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ethics-in-ai/</loc></url><url><loc>https://www.sei.cmu.edu/library/knowing-when-you-dont-know-engineering-ai-systems-in-an-uncertain-world-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-promise-and-challenges-of-recommendation-systems-for-the-dod/</loc></url><url><loc>https://www.sei.cmu.edu/library/train-but-verify-towards-practical-ai-robustness-3/</loc></url><url><loc>https://www.sei.cmu.edu/library/presentation-video-summarization-and-search/</loc><lastmod>2024-05-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/advancing-cyber-operator-tradecraft-through-automated-static-binary-analysis-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/artificial-intelligence-defense-evaluation/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-code-repair-to-ensure-memory-safety-for-source-and-binary/</loc></url><url><loc>https://www.sei.cmu.edu/library/static-analysis-classification-line-funded-research-fy16-20/</loc></url><url><loc>https://www.sei.cmu.edu/library/toward-the-use-of-human-machine-teaming-and-fully-autonomous-operations-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-based-engineering-with-aadl-transitioning-research-to-practice-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/twinops-digital-twins-meet-devops-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/untangling-the-knot-enabling-rapid-software-evolution-3/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-design-conformance-during-continuous-integration-3/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-virtual-schoolhouse/</loc></url><url><loc>https://www.sei.cmu.edu/library/rapid-adjudication-of-static-analysis-alerts-during-ci/</loc></url><url><loc>https://www.sei.cmu.edu/library/emerging-technologies-2020-six-areas-of-opportunity-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/close-the-gap-bringing-engineering-securitycompliance-together/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-welcome-to-devsecops-days-dc-2020/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-the-need-for-threat-modeling-in-a-devsecops-world/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-close-the-gap-bringing-engineering-securitycompliance-together/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-delivering-devsecops-value-faster-use-metrics-and-standards/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-navigating-devops-requirements-with-risk-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-make-it-personal-to-make-it-happen/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-keynote-successful-devsecops-implementation-for-production-environments-is-a-journey-not-a-milestone/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-evolve-your-devsecops-to-manage-speed-and-risk/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-why-organizations-need-devsecops-now-more-than-ever/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-how-software-acquisition-and-devsecops-can-improve-the-lethality-of-the-dod/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-software-acquisition-and-devsecops-can-improve-the-lethality-of-the-dod/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-playbook-for-early-architecture-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/keynote-army-aviation-transformation-establishing-an-operationalized-modular-open-system-approach/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-use-of-acvip-containment-of-the-accumulation-of-program-technical-debt-using-aadl-implemented-on-dassault-syst%C3%A8mes-3dexperience-platform-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/model-based-testing-and-analysis-of-the-cyber-resiliency-of-cyber-physical-systems-the-scaps-project/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-test-and-re-test-atrt-utilizing-aadlsysml-models/</loc></url><url><loc>https://www.sei.cmu.edu/library/avionics-system-of-systems-simulation-and-modeling-tool-chain/</loc></url><url><loc>https://www.sei.cmu.edu/library/keynote-cyber-assured-systems-engineering-with-aadl/</loc></url><url><loc>https://www.sei.cmu.edu/library/aadl-modeling-and-analysis-tool-for-cyber-resiliency-ge-verdict-darpa-case/</loc></url><url><loc>https://www.sei.cmu.edu/library/introduction-to-the-architecture-centric-virtual-integration-process-acvip/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acvip-as-applied-in-army-st-and-the-path-ahead/</loc></url><url><loc>https://www.sei.cmu.edu/library/sysml-to-aadl-bridge-automating-the-translation-of-sysml-into-aadl-for-analysis-and-refinement/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-overview-of-aadl-and-toolsets-to-support-the-engineering-of-safety-critical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/attacking-com-via-word-rtf/</loc><lastmod>2023-10-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/keynote-implementing-devsecops-in-the-missile-defense-agency-mda-ground-based-midcourse-defense-gmd/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/government-devops-is-it-really-different/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/pipeline-analytics-the-foundation-of-the-devsecops-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/on-the-wasted-devops-cycles-caused-by-false-positive-bug-reports/</loc></url><url><loc>https://www.sei.cmu.edu/library/teach-a-man-how-to-fish/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/threat-modeling-wins-for-agile-appsec/</loc></url><url><loc>https://www.sei.cmu.edu/library/improving-resilience-through-service-mesh-metrics/</loc></url><url><loc>https://www.sei.cmu.edu/library/welcome-to-devsecops-days-pittsburgh-2021/</loc></url><url><loc>https://www.sei.cmu.edu/library/insightng-a-system-for-improving-the-analyst-workflow-using-behavior-based-host-detection/</loc></url><url><loc>https://www.sei.cmu.edu/library/ghosts-in-the-machine-orchestrating-a-realistic-cybersecurity-exercise-battlefield-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/microservice-aware-reference-monitoring-through-hybrid-program-analysis-3/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-pluggable-edge-processing-pipeline-for-sysflow/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-welcome-to-devsecops-days-pittsburgh-2021/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-keynote-implementing-devsecops-in-the-missile-defense-agency-mda-ground-based-midcourse-defense-gmd/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-government-devops-is-it-really-different/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-threat-modeling-wins-for-agile-appsec/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-improving-resilience-through-service-mesh-metrics/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-on-the-wasted-devops-cycles-caused-by-false-positive-bug-reports/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-teach-a-man-how-to-fish/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-pipeline-analytics-the-foundation-of-the-devsecops-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-code-repair-to-ensure-spatial-memory-safety/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/welcome-to-devsecops-days-los-angeles-2021/</loc></url><url><loc>https://www.sei.cmu.edu/library/keynote-devsecops-more-than-just-pipelines/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/implementing-policy-as-code-through-open-policy-agent/</loc></url><url><loc>https://www.sei.cmu.edu/library/enhance-appsec-maturity-and-outcomes-using-devsecops-metrics/</loc></url><url><loc>https://www.sei.cmu.edu/library/secrets-in-kubernetes-across-cloud/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-security-first-approach-to-product-innovation/</loc></url><url><loc>https://www.sei.cmu.edu/library/achieving-continuous-compliance-in-devops-programs/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/service-mess-to-service-mesh-2/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-implementing-policy-as-code-through-open-policy-agent/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-secrets-in-kubernetes-across-cloud/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-service-mess-to-service-mesh/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-a-security-first-approach-to-product-innovation/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-keynote-devsecops-more-than-just-pipelines/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-enhance-appsec-maturity-and-outcomes-using-devsecops-metrics/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-achieving-continuous-compliance-in-devops-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/scaife-and-acr-static-analysis-classification-and-automated-code-repair/</loc><lastmod>2024-12-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/untangling-the-knot-automating-software-isolation-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-design-conformance-during-continuous-integration-4/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/readme-a-learned-approach-to-augmenting-software-documentation-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/spiralaiml-resource-constrained-co-optimization-for-high-performance-data-intensive-computing-3/</loc></url><url><loc>https://www.sei.cmu.edu/library/quantum-advantage-evaluation-framework-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/multicore-confidence-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/rapid-certifiable-trust-4/</loc></url><url><loc>https://www.sei.cmu.edu/library/towards-incremental-and-compositionally-verifiable-security-for-chic-centric-cyber-physical-systems-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/combined-analysis-for-source-code-and-binary-code-for-software-assurance-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/rapid-adjudication-of-static-analysis-alerts-during-continuous-integration-3/</loc></url><url><loc>https://www.sei.cmu.edu/library/train-but-verify-towards-practical-ai-robustness-4/</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/knowing-when-you-dont-know-ai-engineering-in-an-uncertain-world/</loc></url><url><loc>https://www.sei.cmu.edu/library/predicting-inference-degradation-in-production-ml-systems-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/untangling-the-knot-recommending-refactorings/</loc></url><url><loc>https://www.sei.cmu.edu/library/ai-for-software-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/collaboration-conversation-on-scalable-assurance-of-safety-critical-systems-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/collaboration-conversation-on-future-gamification-within-the-dod/</loc></url><url><loc>https://www.sei.cmu.edu/library/welcome-to-devsecops-days-washington-dc-2021/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-threat-modeling-to-guide-everything-in-devsecops/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-a-culture-of-security-in-a-developers-company/</loc></url><url><loc>https://www.sei.cmu.edu/library/commonality-and-trends-in-sast-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/devsecops-for-enhancing-security-for-machine-learning/</loc></url><url><loc>https://www.sei.cmu.edu/library/devsecops-lessons-learned-from-covid-19-era/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/threat-modeling-of-cps-in-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-devsecops-for-enhancing-security-for-machine-learning/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-welcome-to-devsecops-days-washington-dc-2021/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-using-threat-modeling-to-guide-everything-in-devsecops/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-devsecops-lessons-learned-from-covid-19-era/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-commonality-and-trends-in-sast-results/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-threat-modeling-of-cps-in-practice/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-building-a-culture-of-security-in-a-developers-company/</loc></url><url><loc>https://www.sei.cmu.edu/library/keynote-securing-the-development-and-supply-chain-of-open-source-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-keynote-securing-the-development-and-supply-chain-of-open-source-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/panel-session-evolving-threat-modeling-for-agility-and-business-value-with-devsecops/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-panel-session-evolving-threat-modeling-for-agility-and-business-value-with-devsecops/</loc></url><url><loc>https://www.sei.cmu.edu/library/juneberry-tutorial/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/nohobbyists/</loc></url><url><loc>https://www.sei.cmu.edu/library/chaos-security-engineering-integrating-security-through-chaos/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-to-misuse-and-abuse-dora-metrics/</loc></url><url><loc>https://www.sei.cmu.edu/library/implementing-pipelines-to-automate-container-maintenance-in-highly-regulated-environments/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-in-the-cloud-from-the-lens-of-a-well-architected-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/are-we-forever-doomed-by-software-supply-chain-risks/</loc></url><url><loc>https://www.sei.cmu.edu/library/welcome-to-devsecops-days-pittsburgh-2022/</loc></url><url><loc>https://www.sei.cmu.edu/library/digital-engineering-effectiveness-for-cyber-physical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/aadl-user-day-2022-welcome/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/keynote-peo-aviation-mosa-transformation-and-the-role-acvip-performs/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acvip-overview/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-assured-systems-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/sysml-to-aadl-with-ocl-validation/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acvip-in-practice-at-sikorsky-lockheed-martin/</loc><lastmod>2025-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/aadl-model-based-cyber-resiliency-key-performance-parameter-determination/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-acvip-jmr-msad-capstone-use-case/</loc></url><url><loc>https://www.sei.cmu.edu/library/innovative-defense-technologies-automated-test-and-retest-atrt-integration-with-the-architecture-analysis-design-language-aadl/</loc></url><url><loc>https://www.sei.cmu.edu/library/aadl-model-and-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/learn-how-to-not-use-secrets-with-owasp-wrong-secrets/</loc></url><url><loc>https://www.sei.cmu.edu/library/welcome-to-devsecops-days-washington-dc-2022/</loc></url><url><loc>https://www.sei.cmu.edu/library/make-the-work-easy-culture-shifting-through-learning/</loc></url><url><loc>https://www.sei.cmu.edu/library/escaping-unicorn-culture/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-art-of-enabling-engineering-excellence-and-devsecops/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/keynote-rise-of-the-software-defined-weapon-accelerate-delivery-or-lose/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-transparency-securing-the-digital-supply-chain/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-is-an-awesome-product-feature-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/keynote-software-barrel-of-monkeys-sbom/</loc></url><url><loc>https://www.sei.cmu.edu/library/minimum-viable-security-how-to-get-started/</loc></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-washington-dc-2022-graphic-recordings/</loc></url><url><loc>https://www.sei.cmu.edu/library/deepfakes-101/</loc></url><url><loc>https://www.sei.cmu.edu/library/where-the-algorithm-and-art-intersect/</loc></url><url><loc>https://www.sei.cmu.edu/library/darpas-sematic-forensics-semafor-research-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/machine-learning-for-deepfake-detection/</loc></url><url><loc>https://www.sei.cmu.edu/library/examination-of-a-deepfake-detection-algorithm/</loc></url><url><loc>https://www.sei.cmu.edu/library/knowing-when-you-dont-know-quantifying-and-reasoning-about-uncertainty-in-machine-learning-models/</loc></url><url><loc>https://www.sei.cmu.edu/library/phite-portable-high-performance-inference-at-the-tactical-edge/</loc></url><url><loc>https://www.sei.cmu.edu/library/automating-mismatch-detection-and-testing-in-ml-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-machine-learning-pipeline-for-deepfake-detection/</loc></url><url><loc>https://www.sei.cmu.edu/library/ai-evaluation-methodology-for-defensive-cyber-operator-tools/</loc></url><url><loc>https://www.sei.cmu.edu/library/transformative-gamification-making-impact-across-the-federal-workforce/</loc></url><url><loc>https://www.sei.cmu.edu/library/chain-games-powering-autonomous-threat-hunting/</loc></url><url><loc>https://www.sei.cmu.edu/library/maturing-assurance-contracts-in-model-based-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/safety-analysis-and-fault-detection-isolation-and-recovery-safir-synthesis-for-time-sensitive-cyber-physical-systems/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/refactoring-for-software-isolation/</loc></url><url><loc>https://www.sei.cmu.edu/library/automated-design-conformance-during-continuous-integration-5/</loc></url><url><loc>https://www.sei.cmu.edu/library/acepops-program-information-at-the-speed-of-relevance/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/advancing-algorithms-for-file-deduplication-across-containers/</loc></url><url><loc>https://www.sei.cmu.edu/library/semantic-equivalence-checking-of-decompiled-binaries/</loc></url><url><loc>https://www.sei.cmu.edu/library/addressing-devsecops-challenges-using-model-based-systems-engineering/</loc><lastmod>2024-05-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-security-framework-asf/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/decypher-cyber-knowledge-graph-queries-expressed-through-natural-language/</loc></url><url><loc>https://www.sei.cmu.edu/library/ipfix-and-dpi-information-in-a-big-data-environment/</loc><lastmod>2026-03-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/taranis-ng-a-new-tool-for-osint-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/dib-vdp-pilot-trail-blazers/</loc><lastmod>2023-11-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/practical-gan-based-synthetic-ip-header-trace-generation-using-netshare/</loc></url><url><loc>https://www.sei.cmu.edu/library/anomaly-detection-on-devices-dns-queries-using-deep-learning/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/combating-disinformation-in-dns-and-beyond/</loc></url><url><loc>https://www.sei.cmu.edu/library/detecting-dns-tunneling-using-behavioral-and-content-metadata-features/</loc></url><url><loc>https://www.sei.cmu.edu/library/guppy-a-scalable-security-data-lake/</loc></url><url><loc>https://www.sei.cmu.edu/library/efficiently-standing-up-a-cloud-based-cybersecurity-data-lake-with-minimal-resourcing/</loc></url><url><loc>https://www.sei.cmu.edu/library/large-scale-data-preparation-for-machine-learning-models/</loc></url><url><loc>https://www.sei.cmu.edu/library/quic-fixes-for-network-security-monitoring/</loc></url><url><loc>https://www.sei.cmu.edu/library/mri-for-the-cloud-workloads-how-network-data-can-power-visibility-detection-and-response-programs-for-securing-cloud-workloads/</loc></url><url><loc>https://www.sei.cmu.edu/library/data-driven-detection-using-pyspark/</loc></url><url><loc>https://www.sei.cmu.edu/library/attempting-to-automate-the-diamond-model/</loc></url><url><loc>https://www.sei.cmu.edu/library/striking-the-balance-measuring-and-managing-the-complexity-of-cyber-environments/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-architecture-conformance-matters-for-software-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/does-your-devsecops-pipeline-only-function-as-intended/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-precog-a-gpu-platform-for-better-enabling-aiml-at-the-edge/</loc><lastmod>2025-06-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-and-traffic-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/leveraging-disparate-enterprise-data-for-cybersecurity-purposes/</loc></url><url><loc>https://www.sei.cmu.edu/library/unexpected-outbound-protocol-unx-obp/</loc></url><url><loc>https://www.sei.cmu.edu/library/addressing-supply-chain-risk-and-resilience-for-software-reliant-systems/</loc><lastmod>2024-04-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2023-presentations-showcase-scalable-analytics-techniques/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2022-sei-year-in-review/</loc><lastmod>2024-04-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-launches-cert-certificate-in-data-science-for-cybersecurity/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ai-next-generation-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-applied-data-science-for-cybersecurity/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-can-data-science-solve-cybersecurity-challenges/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-software-by-design-event-opens-call-for-presentations-and-registration/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/agree-on-a-generally-accepted-set-of-basic-zt-definitions/</loc><lastmod>2024-07-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/blog-post-explores-new-frontier-of-quantum-computing-cybersecurity/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/improving-analytics-using-enriched-network-flow-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/2022-year-in-review-showcases-work-in-machine-learning-software-assurance-devsecops-and-more/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/top-5-challenges-to-overcome-on-your-devsecops-journey/</loc></url><url><loc>https://www.sei.cmu.edu/library/develop-a-standard-protocol-for-access-decisions-in-zero-trust/</loc></url><url><loc>https://www.sei.cmu.edu/library/automating-away-your-devsecops-toil/</loc></url><url><loc>https://www.sei.cmu.edu/library/golfing-with-dragons-building-secure-environments-for-ctfs/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-engineering-workshop-for-educators-returns-for-20th-anniversary/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/implementing-post-quantum-cryptography-in-industry/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-at-early-stage-startup/</loc></url><url><loc>https://www.sei.cmu.edu/library/to-resiliency-and-beyond-how-to-engineer-survivable-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-pittsburgh-2023/</loc></url><url><loc>https://www.sei.cmu.edu/library/spdx-sboms-enabling-automation-of-safety-security-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/welcome-to-devsecops-days-pittsburgh-2023/</loc></url><url><loc>https://www.sei.cmu.edu/library/devsecops-for-the-community-building-provisioning-and-deploying-cves-infrastructure-and-services/</loc></url><url><loc>https://www.sei.cmu.edu/library/securing-the-iot-supply-chain-with-devsecops/</loc></url><url><loc>https://www.sei.cmu.edu/library/virtualization-unlocking-software-modularity-of-embedded-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-welcome-to-devsecops-days-pittsburgh-2023/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-spdx-sboms-enabling-automation-of-safety-security-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-security-at-early-stage-startup/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-automating-away-your-devsecops-toil/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-securing-the-iot-supply-chain-with-devsecops/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-virtualization-unlocking-software-modularity-of-embedded-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-to-resiliency-and-beyond-how-to-engineer-survivable-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-golfing-with-dragons-building-secure-environments-for-ctfs/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-implementing-post-quantum-cryptography-in-industry/</loc></url><url><loc>https://www.sei.cmu.edu/library/graphic-recording-of-devsecops-for-the-community-building-provisioning-and-deploying-cves-infrastructure-and-services/</loc></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-pittsburgh-2023-graphic-recordings/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-model-based-systems-engineering-mbse-to-assure-a-devsecops-pipeline-is-sufficiently-secure/</loc><lastmod>2025-01-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/advancing-the-strategy-for-us-leadership-in-software-and-ai-engineering/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/securing-uefi-an-underpinning-technology-for-computing/</loc></url><url><loc>https://www.sei.cmu.edu/library/you-cant-wait-for-roi-to-justify-model-based-design-and-analysis-for-cyber-physical-systems-embedded-computing-resources/</loc></url><url><loc>https://www.sei.cmu.edu/library/you-cant-wait-for-roi-for-mbse-and-model-based-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-software-by-design-event-agenda-announced/</loc><lastmod>2024-01-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/understanding-vulnerability-analysis-in-the-rust-programming-language/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/information-technology-best-practices/</loc></url><url><loc>https://www.sei.cmu.edu/library/flocon-2024-seeks-presentations-on-situational-awareness-beyond-the-network/</loc><lastmod>2024-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-penetration-testing-findings-repository/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/identifying-and-preventing-the-next-solarwinds/</loc></url><url><loc>https://www.sei.cmu.edu/library/research-services-high-tea-2023/</loc></url><url><loc>https://www.sei.cmu.edu/library/identifying-and-preventing-the-next-solarwinds-2/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dependent-or-not-detecting-and-understanding-collections-of-refactorings/</loc><lastmod>2025-01-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-excellence-through-the-agile-high-velocity-developmentsm-process/</loc></url><url><loc>https://www.sei.cmu.edu/library/scale/</loc><lastmod>2025-01-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/coding-the-future-recommendations-for-defense-software-rd/</loc></url><url><loc>https://www.sei.cmu.edu/library/automating-infrastructure-as-code-with-ansible-and-molecule/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-zero-trust-industry-days-2023/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/engineering-of-edge-software-systems-a-report-from-the-november-2022-sei-workshop-on-software-systems-at-the-edge/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/new-report-recommends-department-of-defense-software-advisory-board/</loc><lastmod>2024-08-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-peek-behind-the-curtain-securely-maintaining-a-development-platform/</loc><lastmod>2025-03-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/will-rust-solve-software-security/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-security-framework-asf-informing-software-bill-of-materials-sbom-use-cases-and-risk-reduction/</loc><lastmod>2025-09-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-approach-applying-zero-trust-in-acquisition/</loc></url><url><loc>https://www.sei.cmu.edu/library/will-rust-solve-software-security-2/</loc><lastmod>2025-03-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/threat-modeling-with-model-based-systems-engineering-mbse/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/building-more-secure-software-with-memory-safe-programming-languages/</loc></url><url><loc>https://www.sei.cmu.edu/library/create-a-risk-based-assessment-for-zero-trust-implementations/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/establish-standard-zero-trust-maturity-levels/</loc></url><url><loc>https://www.sei.cmu.edu/library/devsecops-by-design-how-to-incorporate-security-and-compliance-earlier-than-testing-and-scanning/</loc><lastmod>2025-03-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-by-design-secure-by-default-cisas-path-forward/</loc><lastmod>2025-03-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-software-by-design-2023/</loc><lastmod>2025-03-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/zero-trust-architecture-best-practices-observed-in-industry/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecting-complex-long-lived-scientific-software/</loc><lastmod>2025-01-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/to-resiliency-and-beyond/</loc></url><url><loc>https://www.sei.cmu.edu/library/penetration-testing-findings-repository-now-available/</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/whats-wrong-with-roi-for-model-based-analysis-of-cyber-physical-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/generative-ai-key-opportunities-and-research-challenges/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-bill-of-materials-framework-leveraging-sboms-for-risk-reduction/</loc><lastmod>2023-09-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/zero-trust-industry-days-2023-calls-for-presenters/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-agile-approach-to-independent-verification-and-validation/</loc><lastmod>2023-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-modular-approach-to-verification-of-learning-components-in-cyber-physical-systems/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/institutionalizing-the-fundamentals-of-insider-risk-management/</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/demonstrating-the-practical-utility-and-limitations-of-chatgpt-through-case-studies/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-holistic-view-of-architecture-definition-evolution-and-analysis/</loc></url><url><loc>https://www.sei.cmu.edu/library/us-leadership-in-software-engineering-ai-engineering/</loc><lastmod>2025-03-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/emerging-technologies-seven-themes-changing-the-future-of-software-in-the-dod/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-risk/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-need-for-quantum-software-architecture/</loc><lastmod>2024-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/reducing-insider-risk-through-positive-deterrence/</loc><lastmod>2025-10-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/contracts-in-system-development-from-multiconcern-analysis-to-assurance-with-the-architecture-analysis-and-design-language/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-correct-by-construction-aadl-runtime-for-the-ravenscar-profile-using-spark2014/</loc><lastmod>2023-11-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/reviewing-the-role-of-machine-learning-and-artificial-intelligence-for-remote-attestation-in-5g-networks/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-text-analytics-to-insider-risk-analysis-a-case-study-on-keyword-generation/</loc></url><url><loc>https://www.sei.cmu.edu/library/impact-of-sensor-and-actuator-clock-offsets-on-reinforcement-learning/</loc><lastmod>2023-09-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/towards-intelligent-security-for-unmanned-aerial-vehicles-a-taxonomy-of-attacks-faults-and-detection-mechanisms/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-supported-audit-processor-interactive-query-driven-assurance/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/formalization-of-the-aadl-run-time-services/</loc><lastmod>2024-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/switching-watermarking-based-detection-scheme-against-replay-attacks/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-graph-theoretic-security-index-based-on-undetectability-for-cyber-physical-systems/</loc><lastmod>2023-11-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/increasingly-autonomous-cps-taming-emergent-behaviors-from-an-architectural-perspective/</loc></url><url><loc>https://www.sei.cmu.edu/library/creating-xbd-a-dataset-for-assessing-building-damage-from-satellite-imagery-a/</loc></url><url><loc>https://www.sei.cmu.edu/library/july-2013-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/august-2013-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/september-2013-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/october-2013-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/november-2013-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/december-2013january-2014-winter-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/februarymarch-2014-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/junejuly-2014-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/augustseptember-2014-edition-of-the-secure-coding-newsletter/</loc><lastmod>2023-10-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/summer-2016-edition-of-the-secure-coding-newsletter/</loc></url><url><loc>https://www.sei.cmu.edu/library/behavioral-whitelists-of-beaconing-activity/</loc></url><url><loc>https://www.sei.cmu.edu/library/behavioral-whitelists-of-high-volume-web-traffic-to-specific-domains/</loc></url><url><loc>https://www.sei.cmu.edu/library/name-servers-should-not-move/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/when-your-software-really-matters/</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/designing-scada-systems-for-the-self-verifiability-of-their-security-and-survivability/</loc></url><url><loc>https://www.sei.cmu.edu/library/adaptive-quality-of-service-aqos/</loc></url><url><loc>https://www.sei.cmu.edu/library/emontage-end-user-programming-on-smartphone-in-tactical-environment/</loc></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2012-day-1-part-1/</loc><lastmod>2025-09-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2012-day-2-part-1/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2012-day-2-part-2/</loc><lastmod>2025-09-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tsp-symposium-2012-day-3/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/bandwidth-and-end-to-end-delay-analysis-of-ip-and-end-system-multicast-esm/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-new-visualization-for-ipv4-space/</loc></url><url><loc>https://www.sei.cmu.edu/library/visualization-of-network-flow-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-rayon-tools-visualization-at-the-command-line/</loc></url><url><loc>https://www.sei.cmu.edu/library/finding-malicious-domains-using-shadow-server-reports/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-routing-table-tool-suite-rt-tools-mapping-the-internet-one-route-at-a-time-or-all-routes-at-one-time/</loc></url><url><loc>https://www.sei.cmu.edu/library/discovering-unknown-network-activity-using-graphs-and-computer-network-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/artist-rendering-of-keynote-breaking-the-game-analytics-revolutions-in-baseball/</loc><lastmod>2025-09-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/welcome-to-sam-2014/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2014-presentations/</loc><lastmod>2024-06-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/transparency-an-architecture-principle-for-socio-technical-ecosystems/</loc></url><url><loc>https://www.sei.cmu.edu/library/quality-attribute-workshop-participants-handbook/</loc><lastmod>2024-01-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-documentation-in-practice-documenting-architectural-layers/</loc></url><url><loc>https://www.sei.cmu.edu/library/spiral-development-building-the-culture-a-report-on-the-cse-sei-workshop-february-2000/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/spiral-development-experience-principles-and-refinements-spiral-development-workshop-february-9-2000/</loc></url><url><loc>https://www.sei.cmu.edu/library/an-application-of-the-architecture-based-design-method-to-the-electronic-house/</loc></url><url><loc>https://www.sei.cmu.edu/library/improving-predictability-in-embedded-real-time-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/guidance-on-commercial-based-and-open-systems-for-coast-guard-program-managers/</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/spiral-development-and-evolutionary-acquisition/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/guidance-on-commercial-based-and-open-systems-for-program-managers/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-workshop-on-software-architecture-representation-16-17-january-2001/</loc></url><url><loc>https://www.sei.cmu.edu/library/us-army-acquisition-the-program-office-perspective/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/team-software-process-tsp-coach-mentoring-program-guidebook/</loc></url><url><loc>https://www.sei.cmu.edu/library/proceedings-of-the-3rd-international-workshop-on-a-research-agenda-for-maintenance-and-evolution-of-service-oriented-systems-mesoa-2009/</loc></url><url><loc>https://www.sei.cmu.edu/library/guide-for-scampi-appraisals-accelerated-improvement-method-aim/</loc></url><url><loc>https://www.sei.cmu.edu/library/implementation-guidance-for-the-accelerated-improvement-method-aim/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecting-software-the-sei-way-analyzing-and-evaluating-enterprise-architectures/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecting-software-the-sei-way-architecture-evaluation-a-tool-for-designing-systems-that-meet-users-needs/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecting-software-the-sei-way-software-architecture-fundamentals-technical-business-and-social-influences/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-agile-research-forum-strategic-management-of-architectural-technical-debt/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-agile-research-forum-the-importance-of-applying-agile-technologies-to-key-dod-software-initiatives/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-agile-research-forum-agile-methods-agile-methodstools-techniques-and-practices-for-the-dod-community/</loc></url><url><loc>https://www.sei.cmu.edu/library/sei-agile-research-forum-dod-cio-teri-takai-keynote-address/</loc></url><url><loc>https://www.sei.cmu.edu/library/source-code-analysis-laboratory-scale-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/quantifying-uncertainty-in-early-lifecycle-cost-estimation-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-and-design-of-service-oriented-systems-part-1/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-and-design-of-service-oriented-systems-part-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecting-in-a-complex-world-uncovering-architectural-challenges-in-a-system-of-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecting-in-a-complex-world-eliciting-and-specifying-quality-attribute-requirements/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecting-in-a-complex-world-achieving-agility-and-stability-in-large-scale-software-development/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-cyber-security-rd-pipeline-building-capability-through-science/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/developing-your-cyber-workforce/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/responding-to-a-large-scale-cybersecurity-incident/</loc></url><url><loc>https://www.sei.cmu.edu/library/observations-of-successful-cyber-security-operations/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/achieving-mission-assurance-through-resilience-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/20-years-of-cyber-insecurity/</loc></url><url><loc>https://www.sei.cmu.edu/library/overview-of-the-threat-posed-by-insiders-to-critical-assets/</loc></url><url><loc>https://www.sei.cmu.edu/library/best-practices-and-controls-for-mitigating-insider-threats/</loc></url><url><loc>https://www.sei.cmu.edu/library/components-and-considerations-in-building-an-insider-threat-program/</loc></url><url><loc>https://www.sei.cmu.edu/library/emerging-trends/</loc></url><url><loc>https://www.sei.cmu.edu/library/engineering-realistic-synthetic-insider-threat-cyber-social-test-data/</loc></url><url><loc>https://www.sei.cmu.edu/library/illicit-cyber-activity-involving-fraud/</loc></url><url><loc>https://www.sei.cmu.edu/library/panel-discussion-managing-the-insider-threat-what-every-organization-should-know/</loc></url><url><loc>https://www.sei.cmu.edu/library/taking-advantage-of-agile-while-minimizing-risk/</loc></url><url><loc>https://www.sei.cmu.edu/library/heartbleed-analysis-thoughts-and-actions/</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/abcs-of-operational-resilience/</loc></url><url><loc>https://www.sei.cmu.edu/library/overview-of-the-cert-resilience-management-model-cert-rmm/</loc></url><url><loc>https://www.sei.cmu.edu/library/recent-federal-policies-affecting-the-cybersecurity-and-resiliency-landscape/</loc></url><url><loc>https://www.sei.cmu.edu/library/united-states-postal-inspection-service-uspis/</loc></url><url><loc>https://www.sei.cmu.edu/library/department-of-homeland-security-cyber-resilience-review-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-rmm-user-panel-discussion-uspis-dhs-doe-sungard-lockheed-martin/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/when-measurement-benefits-the-measured/</loc></url><url><loc>https://www.sei.cmu.edu/library/architectural-implications-of-devops/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-architecture-for-big-data-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-smart-grid-maturity-model-around-the-world/</loc></url><url><loc>https://www.sei.cmu.edu/library/architecture-analysis-with-aadl/</loc></url><url><loc>https://www.sei.cmu.edu/library/lessons-in-external-dependency-and-supply-chain-risk-management/</loc></url><url><loc>https://www.sei.cmu.edu/library/risk-priority-number-rpn-a-method-for-software-defect-report-analysis/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tactical-cloudlets-moving-cloud-computing-to-the-edge-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/advancing-cyber-intelligence-practices-through-the-seis-consortium/</loc></url><url><loc>https://www.sei.cmu.edu/library/trends-and-new-directions-in-software-architecture/</loc></url><url><loc>https://www.sei.cmu.edu/library/approaching-security-from-an-architecture-first-perspective-2/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/what-devops-is-not/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/culture-shock-unlocking-devops-with-collaboration-and-communication/</loc></url><url><loc>https://www.sei.cmu.edu/library/cert-alignment-with-cyber-coi-challenges-and-gaps/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-didfail-to-analyze-flow-of-sensitive-information-in-sets-of-android-apps-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/devops-panel-discussion/</loc></url><url><loc>https://www.sei.cmu.edu/library/resilience-panel-discussion/</loc><lastmod>2024-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/finding-related-malware-samples-using-run-time-features/</loc></url><url><loc>https://www.sei.cmu.edu/library/generalized-automated-cyber-readiness-evaluator-ace/</loc></url><url><loc>https://www.sei.cmu.edu/library/enhancing-mobile-device-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/web-traffic-analysis-with-cert-tapioca/</loc></url><url><loc>https://www.sei.cmu.edu/library/cyber-vulnerabilities-in-aviation-today/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-taxonomy-of-testing-types-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/devops-security-ignore-it-as-much-you-would-ignore-normal-security/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/context-enabled-computing/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-network-flow-to-gain-cyber-situational-awareness/</loc></url><url><loc>https://www.sei.cmu.edu/library/structuring-the-chief-information-security-officer-organization-3/</loc></url><url><loc>https://www.sei.cmu.edu/library/intelligence-preparation-for-operational-resilience-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-makes-a-good-software-architect/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-best-practices/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-requirements-engineering-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/continuous-integration-secure-devops/</loc></url><url><loc>https://www.sei.cmu.edu/library/coordinated-vulnerability-disclosure-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/secure-software-development-landscape/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-to-build-an-effective-insider-threat-program-to-comply-with-the-new-nispom-mandate/</loc></url><url><loc>https://www.sei.cmu.edu/library/data-science-what-it-is-and-how-it-can-help-your-company-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/security-practitioner-perspective-on-devops-for-building-secure-solutions/</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/from-secure-coding-to-secure-software/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-to-reduce-the-graveyard-of-software-tools-with-uiux-capability/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-and-scaling-a-malware-analysis-system/</loc></url><url><loc>https://www.sei.cmu.edu/library/building-analytics-for-network-flow-records-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/5-things-you-need-to-know-about-leading-a-successful-large-it-modernization-project/</loc></url><url><loc>https://www.sei.cmu.edu/library/practical-considerations-in-adopting-agilelean-in-government-settings/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-evolving-role-of-the-chief-risk-officer-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/five-keys-to-effective-agile-test-automation-for-government-programs/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/three-secrets-to-successful-agile-metrics-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/weaving-a-fabric-of-trust-ensured-security-privacy-resilience-and-accountability/</loc></url><url><loc>https://www.sei.cmu.edu/library/four-valuable-data-sources-for-network-security-analytics-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/is-software-spoiling-us/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-and-devops-your-questions-our-answers/</loc></url><url><loc>https://www.sei.cmu.edu/library/three-software-innovations-that-dod-needs-now-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/blockchain-your-questions-our-answers-2/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/digital-footprints-managing-privacy-and-security/</loc></url><url><loc>https://www.sei.cmu.edu/library/next-steps-with-blockchain-technology-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/five-ways-to-boost-cybersecurity-with-devops/</loc></url><url><loc>https://www.sei.cmu.edu/library/improve-your-static-analysis-audits-using-cert-scales-new-features-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/helping-you-reach-the-next-level-of-security-6-free-tools-for-creating-a-cyber-simulator/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-makes-a-good-software-architect-2019-edition-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/devsecops-implementation-in-the-dod-barriers-and-enablers/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-your-code-with-ai-and-nlp/</loc></url><url><loc>https://www.sei.cmu.edu/library/three-federal-governmentdod-cloud-transition-issues-and-how-to-prevent-them/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-webinar-series-checkpoint-diagnostic/</loc><lastmod>2023-11-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insider-threats-your-questions-our-answers/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-hygiene-why-the-fundamentals-matter-2/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/becoming-a-better-software-architect/</loc></url><url><loc>https://www.sei.cmu.edu/library/designing-trustworthy-ai-a-user-experience-ux-framework/</loc></url><url><loc>https://www.sei.cmu.edu/library/at-what-point-does-devsecops-become-too-risky-for-the-business/</loc></url><url><loc>https://www.sei.cmu.edu/library/connecting-cyber-risk-managers-to-executives-understanding-risk-governance-and-appetite/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-dods-cybersecurity-maturity-model-certification-and-process-maturity-10-cmmc-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/hitting-the-ground-running-reviewing-the-17-cmmc-level-1o-practices-cmmc-10/</loc></url><url><loc>https://www.sei.cmu.edu/library/adopting-a-devsecops-culture-in-the-dod/</loc></url><url><loc>https://www.sei.cmu.edu/library/trust-verify-authorize-with-devsecops/</loc></url><url><loc>https://www.sei.cmu.edu/library/top-5-considerations-before-boarding-the-container-ship/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-discussion-on-dod-software-advances-and-whats-next-from-sei/</loc></url><url><loc>https://www.sei.cmu.edu/library/solving-current-cyber-challenges-academic-and-industry-collaboration/</loc></url><url><loc>https://www.sei.cmu.edu/library/organizational-resilience-in-a-time-of-crisis/</loc></url><url><loc>https://www.sei.cmu.edu/library/agile-in-government-go-for-insight-not-just-oversight-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/quality-attribute-concerns-for-microservices-at-the-edge/</loc></url><url><loc>https://www.sei.cmu.edu/library/risk-management-for-the-enterprisehow-do-you-get-executives-to-care-about-your-risks/</loc></url><url><loc>https://www.sei.cmu.edu/library/follow-the-cui-setting-the-boundaries-for-your-cmmc-assessment-10-cmmc-10/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/threats-for-machine-learning/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-is-cybersecurity-engineering-and-why-do-i-need-it/</loc></url><url><loc>https://www.sei.cmu.edu/library/busting-the-myths-of-programmer-productivity/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-engineering-for-machine-learning-2/</loc></url><url><loc>https://www.sei.cmu.edu/library/solarwinds-hack-fallout-recovery-and-prevention/</loc></url><url><loc>https://www.sei.cmu.edu/library/modeling-devsecops-to-reduce-the-time-to-deploy-and-increase-resiliency/</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devops-enables-digital-engineering/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/amplifying-your-privacy-program-strategies-for-success/</loc></url><url><loc>https://www.sei.cmu.edu/library/ai-engineering-the-national-initiative-for-human-centered-robust-and-secure-and-scalable-ai/</loc></url><url><loc>https://www.sei.cmu.edu/library/announcing-ieee-2675-devops-standard-to-build-reliable-and-secure-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/how-i-learned-to-stop-worrying-and-love-slas/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-do-we-teach-cybersecurity/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-supply-chain-concerns-for-devsecops-programs/</loc></url><url><loc>https://www.sei.cmu.edu/library/software-development-open-forum-ask-hasan-anything/</loc></url><url><loc>https://www.sei.cmu.edu/library/balanced-approaches-to-insider-risk-management/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ai-engineering-ask-us-anything-about-building-ai-better/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-future-of-ai-scaling-ai-through-ai-engineering/</loc></url><url><loc>https://www.sei.cmu.edu/library/zero-trust-journey/</loc></url><url><loc>https://www.sei.cmu.edu/library/cro-success-factors-in-the-age-of-covid/</loc></url><url><loc>https://www.sei.cmu.edu/library/a-cybersecurity-engineering-strategy-for-devsecops/</loc></url><url><loc>https://www.sei.cmu.edu/library/acquisition-disasters-ideas-for-reducing-acquisition-risk/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ask-us-anything-zero-trust-edition/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/developing-models-to-support-dod-technical-reviews/</loc></url><url><loc>https://www.sei.cmu.edu/library/predictable-use-of-multicore-in-the-army-and-beyond/</loc></url><url><loc>https://www.sei.cmu.edu/library/adapting-agile-and-devsecops-to-improve-non-software-development-teams/</loc></url><url><loc>https://www.sei.cmu.edu/library/what-are-deepfakes-and-how-can-we-detect-them/</loc></url><url><loc>https://www.sei.cmu.edu/library/exploring-an-ai-engineering-body-of-knowledge/</loc></url><url><loc>https://www.sei.cmu.edu/library/using-open-source-to-shrink-the-cyber-workforce-gap/</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ransomware-defense-and-resilience-strategies/</loc></url><url><loc>https://www.sei.cmu.edu/library/applying-the-principles-of-agile-to-strengthen-the-federal-cyber-workforce/</loc></url><url><loc>https://www.sei.cmu.edu/library/infrastructure-as-code-through-ansible/</loc></url><url><loc>https://www.sei.cmu.edu/library/finding-your-way-with-software-engineering-buzzwords/</loc></url><url><loc>https://www.sei.cmu.edu/library/zero-trust-risks-and-research-opportunities/</loc></url><url><loc>https://www.sei.cmu.edu/library/integrating-zero-trust-and-devsecops/</loc><lastmod>2024-03-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/llvm-intermediate-representation-for-code-weakness-identification/</loc></url><url><loc>https://www.sei.cmu.edu/library/the-osate-slicer-graph-based-reachability-for-architectural-models/</loc></url><url><loc>https://www.sei.cmu.edu/library/leveraging-software-bill-of-materials-practices-for-risk-reduction/</loc><lastmod>2024-04-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-partners-fact-sheet/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-program-evaluation/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-vulnerability-assessment-2/</loc><lastmod>2025-03-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/evaluating-trustworthiness-of-ai-systems/</loc></url><url><loc>https://www.sei.cmu.edu/library/insider-risk-management-in-the-post-pandemic-workplace/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/synergy-among-engineering-disciplines-software-cybersecurity-and-ai/</loc><lastmod>2024-01-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-evaluation-and-assessment-materials/</loc></url><url><loc>https://www.sei.cmu.edu/library/why-your-software-cost-estimates-change-over-time-and-how-devsecops-data-can-help-reduce-cost-risk/</loc><lastmod>2023-09-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/assuring-increasingly-autonomous-cyber-physical-systems-collection/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ask-us-anything-generative-ai-edition/</loc><lastmod>2024-05-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/actionable-data-in-the-devsecops-pipeline/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/network-traffic-analysis-with-silk/</loc><lastmod>2023-09-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/to-lead-software-and-ai-engineering-us-faces-five-critical-needs/</loc><lastmod>2024-01-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/augur-a-step-towards-realistic-drift-detection-in-production-ml-systems/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-retrospective-in-engineering-large-language-models-for-national-security/</loc><lastmod>2024-05-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/simulating-realistic-human-activity-using-large-language-model-directives/</loc><lastmod>2024-03-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-supply-chain-risk-management-no-silver-bullet/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-strategy-for-component-product-lines-report-3-component-product-line-governance/</loc><lastmod>2023-12-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-platform-independent-model-pim/</loc><lastmod>2026-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/juneberry/</loc><lastmod>2023-10-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/irl-demo/</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cert-coding-standards-wiki/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-vulnerability-data-archive-and-tools/</loc><lastmod>2023-10-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-netsa-security-suite/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-washington-dc-2023/</loc><lastmod>2023-10-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/amateur-hour-to-alerting-power-overcoming-challenges-in-constructing-a-pii-observability-pipeline/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/securing-the-digital-enterprise-using-open-standards-for-zero-trust/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/are-your-devsecops-capabilities-mature/</loc><lastmod>2023-10-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/scaling-cloud-accounts-and-how-to-secure-access-to-multi-account-estates/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-supports-national-cybersecurity-awareness-month-with-blog-and-more/</loc><lastmod>2024-07-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-billion-decisions-a-day-mlops-powering-dod-scale-missions/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/welcome-to-devsecops-days-washington-dc-2023/</loc><lastmod>2023-10-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/from-code-to-combat-securing-dods-technological-edge-through-devsecops/</loc><lastmod>2023-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/gdb-exploitable-plugin/</loc><lastmod>2023-10-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-kaiju/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mothra/</loc><lastmod>2023-10-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/modern-vulnerability-management-separating-signal-from-the-noise/</loc><lastmod>2023-10-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measuring-the-trustworthiness-of-ai-systems/</loc><lastmod>2023-10-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mixed-trust-computing-for-real-time-systems/</loc><lastmod>2023-10-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/formal-verification-of-a-mixed-trust-synchronization-protocol/</loc><lastmod>2024-03-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-strategy-for-component-product-lines-report-2-specification-modeling-for-components-in-a-component-product-line/</loc><lastmod>2024-03-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-strategy-for-component-product-lines/</loc><lastmod>2023-12-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-13-key-elements-of-an-insider-threat-program/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/assessing-opportunities-for-llms-in-software-engineering-and-acquisition/</loc><lastmod>2023-11-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/improving-your-simulation-fidelity/</loc><lastmod>2025-12-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2023-sei-research-review-cultivates-curiosity/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/connecting-stakeholders-for-dod-software-systems/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-product-managers-evolving-role-in-software-and-systems-development/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/user-centric-metrics-for-agile/</loc><lastmod>2023-11-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/machine-learning-for-cybersecurity-needs-two-way-explainability/</loc><lastmod>2024-01-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-systematic-review-of-system-of-systems-architecture-research/</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-cybersecurity-of-quantum-computing-6-areas-of-research/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-establishes-ai-security-incident-response-team/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/congressional-report-section-835-technical-debt-cmu-sei-2023-tr-003/</loc><lastmod>2025-03-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-leads-study-on-technical-debt-in-software-intensive-dod-systems/</loc><lastmod>2024-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measurement-challenges-in-sw-assurance-and-scrm-white-paper/</loc><lastmod>2023-12-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/chatgpt-and-the-evolution-of-large-language-models-4-case-studies/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/encoding-verification-arguments-to-analyze-high-level-design-certification-claims-experiment-zero-eo/</loc><lastmod>2024-01-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/study-shows-how-to-assess-large-language-model-fitness-for-software-engineering-and-acquisition/</loc><lastmod>2024-01-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-future-of-software-engineering-and-acquisition-with-generative-ai/</loc><lastmod>2024-05-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2015-presentations/</loc><lastmod>2025-10-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-impact-of-architecture-on-the-safety-of-cyber-physical-systems/</loc><lastmod>2024-01-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ask-us-anything-supply-chain-risk-management/</loc><lastmod>2024-06-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-top-10-skills-cisos-need-in-2024/</loc><lastmod>2024-01-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-security-framework-asf-managing-systems-cybersecurity-risk-expanded-set-of-practices/</loc><lastmod>2024-02-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-perspective-on-the-state-of-research-in-fault-tolerant-systems/</loc><lastmod>2024-02-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/fault-tolerant-systems-practitioners-workshop-june-10-11-1991/</loc><lastmod>2024-02-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/workshop-on-the-state-of-the-practice-in-dependably-upgrading-critical-systems/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mapping-metah-into-acme/</loc><lastmod>2024-02-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-coding-in-c-and-c-second-edition/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-security-framework-asf-collection/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/navigating-capability-based-planning-the-benefits-challenges-and-implementation-essentials/</loc><lastmod>2024-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-importance-of-automated-testing-in-open-systems-architecture-initiatives/</loc><lastmod>2024-02-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/when-agile-and-earned-value-management-collide-7-considerations-for-successful-interaction/</loc><lastmod>2024-02-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-chatgpt-to-analyze-your-code-not-so-fast/</loc><lastmod>2024-02-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/considerations-for-evaluating-large-language-models-for-cybersecurity-tasks/</loc><lastmod>2024-03-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-to-evaluate-large-language-models-for-cybersecurity/</loc><lastmod>2024-02-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/atypical-applications-of-agile-and-devsecops-principles/</loc><lastmod>2024-03-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/further-causal-search-analyses-with-uccs-effort-estimation-data/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-large-language-models-in-the-national-security-realm/</loc><lastmod>2024-03-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-software-by-design-event-to-collaborate-on-approaches-to-improve-software-security/</loc><lastmod>2024-03-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-zero-trust-industry-days-2024/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/international-conference-on-conceptual-modeling-er-2024-opens-call-for-papers/</loc><lastmod>2024-03-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/developing-and-using-a-software-bill-of-materials-framework/</loc><lastmod>2024-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-2024-bulletin-summarizing-dod-software-acquisition-documents-with-large-language-models/</loc><lastmod>2024-04-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2023-sei-year-in-review/</loc><lastmod>2024-05-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/explainable-verification-survey-situations-and-new-ideas/</loc><lastmod>2024-04-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2023-year-in-review-highlights-impact-of-sei-research-and-development/</loc><lastmod>2024-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-a-scenario-to-reason-about-implementing-a-zero-trust-strategy/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-a-scenario-to-reason-about-implementing-a-zero-trust-strategy-presentation/</loc><lastmod>2024-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/improve-your-ai-classifiers-with-air-using-causal-discovery-identification-and-estimation/</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/redemption/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/new-sei-tool-brings-visibility-to-devsecops-pipelines/</loc><lastmod>2024-05-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/measurement-challenges-in-software-assurance-and-supply-chain-risk-management/</loc><lastmod>2024-05-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-llms-to-automate-static-analysis-adjudication-and-rationales/</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/can-you-rely-on-your-ai-applying-the-air-tool-to-improve-classifier-performance/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-repair-of-static-analysis-alerts/</loc><lastmod>2024-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ai-trust-and-autonomy-labs-fill-the-gap-between-ai-breakthroughs-and-dod-deployment/</loc><lastmod>2024-06-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-value-of-an-agile-approach-to-independent-verification-and-validation-for-acquisition/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/independent-verification-validation-ivv-for-agile-developed-projects/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/national-csirts-the-seis-role-in-fostering-international-cybersecurity-collaboration/</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/strengthening-cybersecurity-with-a-national-or-government-csirt/</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/reachability-of-system-operation-modes-in-aadl/</loc><lastmod>2024-07-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-systems-dont-happen-by-accident/</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-bill-of-materials-sbom-considerations-for-operational-test-evaluation-activities/</loc><lastmod>2024-07-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/zero-trust-industry-day-2024-panel-discussion/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/redemption-tool-automates-code-repair-from-static-analysis-alerts/</loc><lastmod>2024-06-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/generative-ai-and-software-engineering-education/</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/developing-a-global-network-of-computer-security-incident-response-teams-csirts/</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/application-programming-interface-api-vulnerabilities-and-risks/</loc><lastmod>2024-06-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/zero-trust-industry-day-2024-keynote-presentation/</loc><lastmod>2025-09-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mlteing-models-negotiating-evaluating-and-documenting-model-and-system-qualities/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/safeguarding-against-recent-vulnerabilities-related-to-rust/</loc><lastmod>2024-07-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/guided-architecture-trade-space-exploration-fusing-model-based-engineering-and-design-by-shopping/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-aadl-error-library-an-operationalized-taxonomy-of-system-errors/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-insider-risk-symposium-to-focus-on-deterrence/</loc><lastmod>2024-07-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2005-presentations/</loc><lastmod>2025-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cimcor-materials-for-zero-trust-industry-day-2024/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/architecture-centric-virtual-integration-process-acvip-a-key-component-of-the-dod-digital-engineering-strategy/</loc><lastmod>2024-07-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/zentera-systems-materials-for-zero-trust-industry-day-2024/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyolo-materials-for-zero-trust-industry-day-2024/</loc><lastmod>2024-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/3-api-security-risks-and-mitigations/</loc><lastmod>2024-07-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/safe-and-secure-deeply-integrating-security-in-a-new-hazard-analysis/</loc><lastmod>2024-08-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-model-problem-for-assurance-research-an-autonomous-humanitarian-mission-scenario/</loc><lastmod>2024-07-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/capability-based-planning-for-early-stage-software-development/</loc><lastmod>2024-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/evaluating-large-language-models-for-cybersecurity-tasks-challenges-and-best-practices/</loc><lastmod>2024-07-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/on-the-design-development-and-testing-of-modern-apis/</loc><lastmod>2024-08-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/new-sei-course-teaches-how-to-develop-a-national-or-government-csirt/</loc><lastmod>2024-07-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-zero-trust-industry-days-2024-collection/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/zero-trust-industry-day-2024-request-for-information-rfi-2/</loc><lastmod>2024-08-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/anatomy-of-a-java-0-day-exploit/</loc><lastmod>2024-08-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/semantic-fidelity-of-decompilers/</loc><lastmod>2024-08-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/guided-architecture-trade-space-exploration-fusing-model-based-engineering-and-design-by-shopping-conference-paper/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-researchers-talk-large-language-models-for-cybersecurity/</loc><lastmod>2024-08-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/lessons-learned-in-coordinated-disclosure-for-ai-and-ml-systems/</loc><lastmod>2024-08-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tec-ml-mismatch-detection-tool/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/3-api-security-risks-and-how-to-protect-against-them/</loc><lastmod>2024-08-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/embracing-ai-unlocking-scalability-and-transformation-through-generative-text-imagery-and-synthetic-audio/</loc><lastmod>2024-08-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-quality-attribute-scenarios-for-ml-model-test-case-generation/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/counter-ai-what-is-it-and-what-can-you-do-about-it/</loc><lastmod>2025-07-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/3-recommendations-for-machine-unlearning-evaluation-challenges/</loc><lastmod>2024-08-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/capability-based-software-cost-estimation-cabsce/</loc><lastmod>2025-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-role-playing-scenarios-to-identify-bias-in-llms/</loc><lastmod>2024-09-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/collection-of-static-analysis-tools/</loc><lastmod>2024-10-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-bulletin-counter-ai-what-is-it-and-what-can-you-do-about-it/</loc><lastmod>2024-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/best-practices-and-lessons-learned-in-standing-up-an-aisirt/</loc><lastmod>2024-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/anatomy-of-yet-another-java-0-day-exploit/</loc><lastmod>2024-11-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-days-washington-dc-2024/</loc><lastmod>2024-09-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/welcome-to-devsecops-days-washington-dc-2024/</loc><lastmod>2024-09-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/positive-deterrence-for-reducing-insider-threat-collection/</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/game-theoretic-modeling-and-analysis-of-insider-compliance-with-security-policy/</loc><lastmod>2024-10-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/keynote-does-devops-matter-to-the-warfighter/</loc><lastmod>2024-09-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/establishing-the-first-open-source-program-office-ospo-at-a-united-states-federal-agency/</loc><lastmod>2024-09-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-sboms-change-software-supply-chain-management/</loc><lastmod>2024-09-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/demystifying-ai-risk-an-actionable-framework-aligning-business-needs-to-risks-and-mitigations/</loc><lastmod>2024-09-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dont-let-sboms-become-yet-another-compliance-activity/</loc><lastmod>2024-10-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/right-sized-devsecops-for-open-source-projects/</loc><lastmod>2024-10-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/shaping-organizational-culture-through-balanced-deterrence/</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/modeling-interventions-for-insider-threat/</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/balancing-organizational-incentives-to-counter-insider-threat/</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/positive-deterrence-and-its-role-in-countering-extremist-acts-against-organizations/</loc><lastmod>2024-09-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-releases-positive-deterrence-research-to-support-national-insider-threat-awareness-month/</loc><lastmod>2024-09-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-devsecops-and-scrm-capability-in-your-zero-trust-architecture/</loc><lastmod>2024-10-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/3-key-elements-for-designing-secure-systems/</loc><lastmod>2024-10-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/redemption-tool-demo-video-separate-environments-for-code-compilation-and-code-repair/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/alert-type-frequency-assessment-of-open-source-static-analysis-tools-and-codebases/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cert-division-research-supports-cybersecurity-awareness/</loc><lastmod>2024-10-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/anatomy-of-another-java-zero-day-exploit/</loc><lastmod>2024-11-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-processes-of-insider-threat-analysis/</loc><lastmod>2024-11-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/aggregate-indicator-measurement-method-characterization/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insider-threat-indicator-cost-matrix/</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/developing-insider-risk-metrics-from-host-based-monitoring/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/from-chaos-to-clarity-conceptual-modeling-for-complex-systems/</loc><lastmod>2024-10-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-metrics-protecting-data-and-understanding-threats/</loc><lastmod>2024-10-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/results-of-chatgpt-analysis-of-java-and-c/</loc><lastmod>2024-10-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/independent-verification-and-validation-for-agile-projects/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/new-sei-tool-enhances-machine-learning-model-test-and-evaluation/</loc><lastmod>2024-10-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/redemption-demo-use-microsoft-visual-studio-code-to-view-redemption-repairs-ignore-accept-revert/</loc><lastmod>2024-12-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/terrain-in-cyberspace-operations-terminology/</loc><lastmod>2025-02-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/self-assessment-in-training-and-exercise/</loc><lastmod>2024-10-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/redemption-tool-demo-view-difference-between-original-code-and-repaired-code-manual-review/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/er-2024-program/</loc><lastmod>2025-08-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-challenges-in-health-care-managing-for-operational-resilience/</loc><lastmod>2024-10-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2024-secure-software-by-design-presentations/</loc><lastmod>2024-12-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/toward-the-use-of-artificial-intelligence-ai-for-advanced-persistent-threat-detection/</loc><lastmod>2024-11-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/modularizing-your-software/</loc><lastmod>2024-11-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2024-sei-research-review-crafts-connections-sei-bulletin/</loc><lastmod>2024-11-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/gain-greater-confidence-in-your-ai-solutions-with-air-using-causal-discovery-identification-and-estimation-to-improve-your-ai-classifiers/</loc><lastmod>2024-11-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cabsce-poster/</loc><lastmod>2025-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mbsynergy-poster/</loc><lastmod>2024-11-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/detection-of-malicious-poster/</loc><lastmod>2024-11-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/oscar-poster/</loc><lastmod>2024-11-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/shift-left-poster/</loc><lastmod>2024-11-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2024-posters/</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/untangling-the-knot-poster/</loc><lastmod>2026-04-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/assurance-evidence-of-continuously-evolving-real-time-systems-asert-workshop-2024/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/oscar-the-ontology-for-soc-creation-assistance-and-replication/</loc><lastmod>2024-11-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dangers-of-ai-for-insider-risk-evaluation-dare/</loc><lastmod>2024-11-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cmu-sei-research-review-2024/</loc><lastmod>2024-11-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/rr24-crafting-connections-presentation/</loc><lastmod>2024-11-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/rr24-ai-robustness/</loc><lastmod>2024-12-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/rr24-co-design-for-edge-artificial-intelligence/</loc><lastmod>2025-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/rr24-detection-of-malicious-code/</loc><lastmod>2024-12-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/rr24-explainable-verification/</loc><lastmod>2024-12-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/rr24-vessel/</loc><lastmod>2024-12-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/rr24-towards-compositional-assurance/</loc><lastmod>2024-12-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-software-by-design-2024-presentations-available-sei-bulletin/</loc><lastmod>2024-11-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon-2024-assets/</loc><lastmod>2025-02-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/role-of-automation-in-reducing-software-refactoring-costs/</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/vessel-tool-enhances-container-reproducibility-and-security-sei-bulletin/</loc><lastmod>2024-12-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-introduction-to-software-cost-estimation/</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-forensic-and-measurement-netflow/</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-fusing-aws-vpc-flow-logs-and-traditional-netflow/</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-securing-active-directory-operationsin-untrusted-regions/</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-empowering-cyber-operators-with-enhanced-cti-pipelines/</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-charting-a-course-to-navigate-the-waters-of-a-cybersecurity-data-lake/</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/security-engineering-framework-sef-24sr022/</loc><lastmod>2024-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/security-engineering-framework-sef-quick-start-guide/</loc><lastmod>2025-01-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-applying-the-standardized-process-for-data-analytics/</loc><lastmod>2024-12-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-orchestrating-5g-network-slicing-by-software-defined-networking-and-network-function-virtualization/</loc><lastmod>2024-12-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-applying-a-wide-angle-lens-for-a-new-take-on-cybersecurity-use-cases/</loc><lastmod>2025-02-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-a-behind-the-scenes-view-of-supporting-ml-based-security-solutions/</loc><lastmod>2024-12-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-performance-of-machine-learning-algorithms-on-uwf-zeekdata22/</loc><lastmod>2024-12-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-introducing-uwf-zeekdata-network-datasets-based-on-the-mitre-attck-framework/</loc><lastmod>2024-12-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insider-risk-management-symposium-2024-presentations/</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-netflow-data-cleaning-and-feature-engineering/</loc><lastmod>2024-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-working-with-cloud-flow-data/</loc><lastmod>2024-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/securing-docker-containers-techniques-challenges-and-tools/</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-i-just-met-you-and-this-is-crazy/</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-sentimental-behavioural-analytics/</loc><lastmod>2025-02-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-releases-security-engineering-framework-sei-bulletin/</loc><lastmod>2024-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/capability-based-software-cost-estimation-cabsce-paper/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/investigating-causal-effects-of-software-and-systems-engineering-effort/</loc><lastmod>2025-03-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/static-analysis-targeted-automated-repair-to-secure-code-and-reduce-effort/</loc><lastmod>2025-02-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-blc/</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-foresight-using-incident-reports-to-improve-measurability-of-risk-exposure-for-predictability/</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-cdgym-expandable-model-agnostic-cyber-deception-platform/</loc><lastmod>2024-12-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/addressing-todays-software-risks-requires-an-assurance-educated-workforce/</loc><lastmod>2025-01-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/understanding-the-need-for-cyber-resilience/</loc><lastmod>2025-01-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/presidents-cup-cybersecurity-competition-challenges/</loc><lastmod>2025-01-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-readiness-research/</loc><lastmod>2025-01-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/portend-toolset-creates-guardrails-for-machine-learning-data-drift-sei-bulletin/</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cubespace-presidents-cup-cybersecurity-competition-game/</loc><lastmod>2025-01-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/gameboard/</loc><lastmod>2025-01-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-support-for-presidents-cup-leaves-lasting-legacy-sei-bulletin/</loc><lastmod>2025-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/do-you-know-what-your-software-is-actually-doing/</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/approach-to-skilling-the-cyber-workforce/</loc><lastmod>2025-02-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/streamlining-containers-for-edge-computing/</loc><lastmod>2025-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/portend-drift-planning-in-ml-systems/</loc><lastmod>2025-02-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-platform-independent-model-systems-engineering-meets-devsecops-for-secure-development/</loc><lastmod>2025-02-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-releases-beta-insider-incident-data-exchange-standard-sei-bulletin/</loc><lastmod>2025-02-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-llms-to-adjudicate-static-analysis-alerts/</loc><lastmod>2025-02-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/flocon2024-demystifying-the-shape-of-traffic/</loc><lastmod>2025-02-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/operational-resilience-fundamentals-building-blocks-of-a-survivable-enterprise/</loc><lastmod>2025-02-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/silent-sentinel-tool-automates-software-risk-analysis-sei-bulletin/</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dod-software-modernization-sei-impact-and-innovation/</loc><lastmod>2025-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/elements-of-effective-communications-for-cybersecurity-teams/</loc><lastmod>2025-02-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/improving-machine-learning-test-and-evaluation-with-mlte/</loc><lastmod>2025-03-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/preliminary-causal-discovery-results-with-software-effort-estimation-data/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/revisiting-investigating-causal-effects-of-software-and-systems-engineering-effort-using-new-causal-search-algorithms/</loc><lastmod>2025-03-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/experience-searching-for-causal-factors-in-personal-process-student-data/</loc><lastmod>2025-03-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dod-software-modernization-sei-impact-and-innovation-sei-bulletin/</loc><lastmod>2025-03-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dod-software-acquisition-pathway-modernizing-and-speeding-software-acquisition/</loc><lastmod>2025-03-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/can-a-cybersecurity-parametric-cost-model-be-developed/</loc><lastmod>2025-03-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ai-hygiene-starts-with-models-and-data-loaders/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/grace-lewis-outlines-vision-for-ieee-computer-society-presidency/</loc><lastmod>2025-03-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-future-of-software-engineering-and-acquisition-with-generative-artificial-intelligence/</loc><lastmod>2026-02-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/new-dod-memo-accelerates-software-acquisition-modernization-sei-bulletin/</loc><lastmod>2025-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/getting-the-most-out-of-your-insider-risk-data-with-iides/</loc><lastmod>2025-12-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/threat-hunting-what-should-keep-all-of-us-up-at-night/</loc><lastmod>2025-03-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mlte-machine-learning-test-and-evaluation/</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/new-data-exchange-standard-eases-insider-incident-data-collection-and-sharing/</loc><lastmod>2025-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/new-research-supports-sei-aisirt-mission-to-secure-artificial-intelligence-sei-bulletin/</loc><lastmod>2025-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/key-takeaways-from-zero-trust-industry-day-2024/</loc><lastmod>2025-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mlte-system-centric-test-and-evaluation-of-machine-learning-models/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-presentations-collection/</loc><lastmod>2025-06-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-maturity-model-certification-cmmc/</loc><lastmod>2025-04-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/reference-architecture-for-assuring-ethical-conduct-in-laws/</loc><lastmod>2025-04-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/center-for-calibrated-trust-measurement-and-evaluation-categuidebook-for-the-development-and-tevv-of-laws-to-promote-trustworthiness/</loc><lastmod>2025-04-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/icssp-2022-presentations/</loc><lastmod>2025-04-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/workshop-software-systems-at-edge-presentations/</loc><lastmod>2025-04-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/leveraging-llms-for-data-coding/</loc><lastmod>2025-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/kubernetes-k8s-in-the-air-gap/</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/delivering-next-generation-cyber-capabilities-to-the-warfighter/</loc><lastmod>2025-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/delivering-next-generation-cyber-capabilities-to-the-warfighter-sei-bulletin/</loc><lastmod>2025-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/revelations-from-agile-devsecops-transformation-large-organization-experiential-case-study/</loc><lastmod>2025-04-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tribute-watts-humphrey/</loc><lastmod>2025-04-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/why-doesnt-anyone-program-anymore/</loc><lastmod>2025-04-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/revelations-from-agile-devsecops-transformation-in-large-organization-experiential-case-study/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/international-conference-software-systems-processes-2022-assets/</loc><lastmod>2025-04-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/why-do-we-have-an-edge-computing-challenge-in-dod/</loc><lastmod>2025-04-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-systems-at-edge-sei-portfolio/</loc><lastmod>2025-04-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2022-sei-workshop-software-systems-edge-assets/</loc><lastmod>2025-04-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-workshop-software-systems-edge-welcome-agenda/</loc><lastmod>2025-04-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/malware-research-if-you-cannot-replicate-it-you-will-not-use-it/</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/updating-risk-assessment-in-the-cert-secure-coding-standard/</loc><lastmod>2025-05-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-research-for-a-secure-tomorrow/</loc><lastmod>2025-07-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-ai-division-building-ai-better/</loc><lastmod>2025-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-as-a-strategic-advantage-for-national-security/</loc><lastmod>2025-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/identifying-and-mitigating-cyber-risk/</loc><lastmod>2025-04-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/getting-started-with-air/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/air-improved-confidence-in-your-ai-solutions/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2024-sei-year-in-review/</loc><lastmod>2025-05-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-socio-technical-perspective-on-software-vulnerabilities-a-causal-analysis/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/10-things-organizations-should-know-about-ai-workforce-development/</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-new-performance-zone-for-software-for-national-security/</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automating-mismatch-detection-in-machine-learning-ml-systems-using-tec/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-best-and-the-brightest-6-years-of-supporting-the-presidents-cup-cybersecurity-competition/</loc><lastmod>2025-05-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/i-spy-with-my-hacker-eye-how-hackers-use-public-info-to-crack-your-creds/</loc><lastmod>2025-05-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-study-on-defense-department-devsecops-finds-excellence-and-opportunities/</loc><lastmod>2025-05-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-state-of-devsecops-in-the-dod-where-we-are-and-whats-next/</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-state-of-devsecops/</loc><lastmod>2025-05-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/practical-supervised-machine-learning-classification-of-highly-imbalanced-text/</loc><lastmod>2025-05-27</lastmod></url><url><loc>https://www.sei.cmu.edu/library/will-generative-ai-fill-the-automation-gap-in-software-architecting/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/machine-learning-test-and-evaluation-tool-and-process-adds-features-sei-bulletin/</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/deploying-on-the-edge/</loc><lastmod>2025-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/demystifying-operational-resilience/</loc><lastmod>2025-06-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2016-presentations/</loc><lastmod>2025-07-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2017-presentations/</loc><lastmod>2025-07-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/saturn-2018-presentations/</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/making-process-respectable-again-advancing-devsecops-in-the-dod-mission-space/</loc><lastmod>2025-06-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/non-dod-work-sponsor-user-guide/</loc><lastmod>2026-03-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/an-introduction-to-the-mlops-tool-evaluation-rubric/</loc><lastmod>2025-10-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/model-based-systems-engineering-in-practice-conference-opens-call-for-presentations-registration-sei-bulletin/</loc><lastmod>2025-06-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-magic-in-the-middle-evolving-scaled-software-for-national-defense/</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/marking-40-years-of-innovation-and-a-renewed-contract-with-defense-department-sei-bulletin/</loc><lastmod>2025-06-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/devsecops-see-use-succeed/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/machine-learning-operations-mlops-evaluation-rubric/</loc><lastmod>2025-10-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/model-your-way-to-better-cybersecurity/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/insider-risk-management-symposium-2025/</loc><lastmod>2025-08-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/what-can-generative-ai-red-teaming-learn-from-cyber-red-teaming/</loc><lastmod>2025-07-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/identifying-ai-talent-for-the-dod-workforce/</loc><lastmod>2025-10-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-bill-of-materials-sbom-harmonization-plugfest-2024/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mitigating-cyber-risk-with-secure-by-design/</loc><lastmod>2025-07-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-tool-helps-determine-causes-of-ai-bias-improves-ai-trust-sei-bulletin/</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/report-on-the-first-mbsynergy-workshop/</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ai-robustness-air-tool/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/observational-humanai-ohai-a-defender-attribution-framework-for-distinguishing-human-vs-ai-threats/</loc><lastmod>2025-07-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/seventh-international-workshop-managing-technical-debt-collection/</loc><lastmod>2025-07-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sam-2015-proceedings-presentations/</loc><lastmod>2025-07-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/vessel-reproducible-container-builds/</loc><lastmod>2025-07-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/achieving-balance-agility-mbse-and-architecture/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/understanding-container-reproducibility-challenges-stopping-the-next-solar-winds/</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-events-offer-industry-insights-on-model-based-systems-engineering-and-secure-software-by-design-sei-bulletin/</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://www.sei.cmu.edu/library/detection-of-malicious-code-dmc-tool/</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/accelerating-commercial-aiml-innovation-for-the-warfighter-cmu-sei-and-diu/</loc><lastmod>2025-08-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/static-analysis-targeted-automated-repair-securing-code-and-reducing-effort/</loc><lastmod>2025-08-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/achieving-balance-agile-mbse-and-architecture-up-front/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/detection-of-malicious-code-taint-flow-analysis-for-weapons-systems-software/</loc><lastmod>2025-09-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/detection-of-malicious-code-assets/</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-workshop-calls-for-improved-model-based-systems-engineering-in-defense-and-intelligence-sei-bulletin/</loc><lastmod>2025-08-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/quantum-computing-meets-high-performance-computing-skills-in-the-class/</loc><lastmod>2025-10-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/generative-ai-red-teaming-can-learn-much-from-cybersecurity-says-sei-study-sei-bulletin/</loc><lastmod>2025-09-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-semantics-of-aadl-emv2-and-its-application-to-model-based-fault-tree-generation/</loc><lastmod>2025-09-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/threat-modeling-protecting-our-nations-software-intensive-systems/</loc><lastmod>2025-09-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cybersecurity-maturity-model-certification-rule-finalized-for-defense-industrial-base-sei-bulletin/</loc><lastmod>2025-09-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/the-benefits-of-rust-adoption-for-mission-and-safety-critical-systems/</loc><lastmod>2025-09-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/towards-better-understanding-domain-shift-linear-probed-visual-foundation-models/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/assessing-llms-high-stakes-applications/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/augmenting-intelligence-ethical-challenges-age-ai/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/analytic-solution-covariance-propagation-neural-networks/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/building-hybrid-b-spline-neural-network-operators/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/gone-not-forgotten-improved-benchmarks-machine-unlearning/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tales-from-wild-west-crafting-scenarios-audit-bias-llms/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/deep-operator-learning-based-surrogate-models-aerothermodynamic-analysis-aedc-hypersonic-waverider/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/trustworthy-by-design/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/transparency-wild-navigating-deployed-ai-system-broaden-need-finding-approaches/</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/red-teaming-generative-ai-silver-bullet-security-theater/</loc><lastmod>2025-10-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/concept-rot-poisoning-concepts-large-language-models-editing/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/physics-informed-deep-b-spline-networks-dynamical-systems/</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ai-division-publications/</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tailoring-security-and-zero-trust-principles-to-weapon-system-environments/</loc><lastmod>2025-10-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/design-of-enhanced-pointer-ownership-model-for-c/</loc><lastmod>2025-09-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-code-repair-for-cc-static-analysis/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-llms-to-evaluate-code/</loc><lastmod>2025-10-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/delivering-next-generation-artificial-intelligence/</loc><lastmod>2025-10-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-launches-software-acquisition-go-bag/</loc><lastmod>2025-10-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/pointer-ownership-model-temporal-memory-safety-framework-for-c/</loc><lastmod>2026-02-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/open-dataset-rc_data-for-classifier-research/</loc><lastmod>2026-03-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/criteria-for-evaluating-a-software-systems-model/</loc><lastmod>2025-10-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-software-by-design-2025-presentations/</loc><lastmod>2025-12-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/standardization-of-return-on-risk-investment-computation/</loc><lastmod>2025-10-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/2007-e-crime-watch-survey-results/</loc><lastmod>2025-10-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/api-security-an-emerging-concern-in-zero-trust-implementations/</loc><lastmod>2025-10-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/q-day-countdown-are-you-prepared/</loc><lastmod>2025-10-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mutation-based-safety-testing-for-autonomy-mobsta/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/matchnmetric/</loc><lastmod>2025-10-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-cert-division-research-raises-cybersecurity-awareness/</loc><lastmod>2025-10-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/minimally-viable-architecture-architecture-early-in-development/</loc><lastmod>2025-10-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/5-essential-questions-for-implementing-the-software-acquisition-pathway-and-the-tools-to-tackle-them/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/mbsynergy-scenario-based-approach-improving-mbse/</loc><lastmod>2025-10-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/preliminary-architectural-analysis/</loc><lastmod>2025-10-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/model-based-systems-engineering-mbse-in-practice-2025/</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/getting-your-software-supply-chain-intune-with-sbom-harmonization/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/applying-security-and-zero-trust-principles-to-weapon-systems-sei-bulletin/</loc><lastmod>2025-10-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/c/</loc><lastmod>2026-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-to-address-the-problem-of-poorly-defined-requirements-in-software-system-design/</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/from-hype-to-adoption-guiding-organizations-in-their-ai-journey/</loc><lastmod>2025-11-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/what-could-possibly-go-wrong-safety-analysis-for-ai-systems/</loc><lastmod>2025-11-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/from-data-to-performance-understanding-and-improving-your-ai-model/</loc><lastmod>2025-11-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/bridging-research-and-practice-in-llm-agent-security/</loc><lastmod>2025-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/prioritizing-and-testing-non-functional-requirements-a-practical-guide/</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://www.sei.cmu.edu/library/silent-sentinel-assets/</loc><lastmod>2026-02-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/bridging-research-and-practice-in-llm-agent-security-sei-bulletin/</loc><lastmod>2025-12-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/orchestrating-the-chaos-protecting-wireless-networks-from-cyber-attacks/</loc><lastmod>2025-12-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/a-practitioners-guide-to-designing-and-developing-hands-on-cybersecurity-skilling-continuation-labs/</loc><lastmod>2025-12-10</lastmod></url><url><loc>https://www.sei.cmu.edu/library/aimaturitymodel-overview/</loc><lastmod>2026-04-30</lastmod></url><url><loc>https://www.sei.cmu.edu/library/swp-essentials-kit/</loc><lastmod>2026-05-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/what-is-the-swp/</loc><lastmod>2025-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/swp-ready-set-go/</loc><lastmod>2025-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/go-bag-users-guide/</loc><lastmod>2025-12-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-do-we-scope-and-sequence-an-mvp-mvcr-and-subsequent-releases/</loc><lastmod>2025-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/for-those-on-the-software-acquisition-pathway-swp-how-do-we-catch-problems-before-they-escalate/</loc><lastmod>2025-12-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/scaling-code-translation/</loc><lastmod>2025-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/helping-defense-programs-get-on-the-software-acquisition-pathway-sei-bulletin/</loc><lastmod>2025-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/right-sized-devsecops-how-tooling-complexity-breaks-modern-pipelines/</loc><lastmod>2026-01-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-parser-demystifies-firmware-to-fight-vulnerabilities-sei-bulletin/</loc><lastmod>2026-01-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-acquisition-pathway-ready-set-go/</loc><lastmod>2026-01-20</lastmod></url><url><loc>https://www.sei.cmu.edu/library/independent-assessment-of-civilian-cybersecurity-reserve-for-department-of-defense/</loc><lastmod>2026-01-23</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-advises-congress-on-civilian-cybersecurity-reserve-sei-bulletin/</loc><lastmod>2026-01-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cyber-assessment-and-validation-cav-team/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/crucible-cyber-platform/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/visibility-through-the-clouds-with-network-flow-logs/</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/b-21-waypoints-streamlined-quarterly-planning/</loc><lastmod>2026-02-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/skip-navigation-search-create-9-avatar-image-ai-for-the-warfighter-acquisition-challenges-and-guidance/</loc><lastmod>2026-02-02</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-design-systems-lead-to-accessible-and-secure/</loc><lastmod>2026-02-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-popular-llms-for-static-analysis-alert-adjudication-for-the-2025-dow-aiml-technical-exchange-meeting/</loc><lastmod>2026-02-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/paul-nielsen-to-conclude-over-two-decades-of-guiding-the-seis-growth-and-success-sei-bulletin/</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/transforming-mission-through-volumetric-reconstruction/</loc><lastmod>2026-02-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/evaluating-talos-linux-for-department-of-war-kubernetes-deployments/</loc><lastmod>2026-02-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/dynamic-analysis-of-an-executables-system-impact/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/temporal-memory-safety-in-c-and-c-an-ai-enhanced-pointer-ownership-model/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/has-your-pmo-built-an-agile-culture-across-the-program-office/</loc><lastmod>2026-02-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/does-your-pmo-have-a-plan-to-use-agile-methods-in-a-devsecops-environment/</loc><lastmod>2026-02-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/pointer-ownership-model-ai-powered-memory-safety-for-c-applications/</loc><lastmod>2026-02-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ai-powered-memory-safety-for-c-applications/</loc><lastmod>2026-02-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/symposium-to-address-cyber-mission-readiness-in-the-age-of-artificial-intelligence-sei-bulletin/</loc><lastmod>2026-02-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/instantiating-the-error-model-version-2-emv2-annex/</loc><lastmod>2026-03-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/applying-causal-learning-to-evaluate-large-language-models-llms/</loc><lastmod>2026-03-03</lastmod></url><url><loc>https://www.sei.cmu.edu/library/maturing-ai-adoption-from-chaos-to-consistency/</loc><lastmod>2026-03-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/leveraging-ai-to-build-cyber-capacity/</loc><lastmod>2026-03-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/maturing-ai-adoption-from-chaos-to-consistency-sei-bulletin/</loc><lastmod>2026-03-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/is-your-pmo-ready-to-involve-users-in-the-software-pathway-swp-and-to-adapt-as-needed/</loc><lastmod>2026-03-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/how-does-a-cns-drive-the-process-for-creating-working-software/</loc><lastmod>2026-03-05</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cracking-the-cns-code/</loc><lastmod>2026-03-13</lastmod></url><url><loc>https://www.sei.cmu.edu/library/all-the-tools-you-need-the-seis-software-acquisition-go-bag/</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.sei.cmu.edu/library/acquisition-oversight-for-software-assurance/</loc><lastmod>2026-03-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/-acquisition-oversight-for-software-assurance/</loc><lastmod>2026-03-12</lastmod></url><url><loc>https://www.sei.cmu.edu/library/managing-architectural-risk-during-agile-development/</loc><lastmod>2026-03-31</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-acquisition-go-bag-cracking-the-cns-code/</loc><lastmod>2026-03-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/software-acquisition-go-bag-cracking-the-cns-code-slides/</loc><lastmod>2026-03-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/foundational-practices-for-ai-for-autonomy/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cracking-the-capability-needs-statement-cns-code-sei-bulletin/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/library/with-ittle-help-from-our-civilian-friends-cybersecurity-reserve-both-feasible-advisable/</loc><lastmod>2026-05-01</lastmod></url><url><loc>https://www.sei.cmu.edu/library/evaluation-of-methods-for-managing-secrets-for-kubernetes-on-microsoft-azure/</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://www.sei.cmu.edu/library/decoding-swp-metrics/</loc><lastmod>2026-05-04</lastmod></url><url><loc>https://www.sei.cmu.edu/library/leadership-legacy-and-the-power-of-mentors-insights-from-dr-paul-nielsen/</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/library/llms-to-adjudicate-static-analysis-alerts-lasaa/</loc><lastmod>2026-04-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/secure-code-faster-at-lower-cost-for-ground-and-space-systems/</loc><lastmod>2026-04-08</lastmod></url><url><loc>https://www.sei.cmu.edu/library/automated-techniques-for-ground-systems-software-security/</loc><lastmod>2026-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/llms-to-adjudicate-static-analysis-alerts-lasaa-assets/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/tools-for-building-an-ai-enabled-soc/</loc><lastmod>2026-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/summaries-from-the-2025-sei-year-in-review/</loc><lastmod>2026-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/library/using-generative-ai-to-translate-uncommon-programming-languages/</loc><lastmod>2026-04-14</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-launches-leadership-in-ai-for-cybersecurity-application-workshop-sei-bulletin/</loc><lastmod>2026-04-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/inch-working-group-presentations/</loc><lastmod>2026-04-15</lastmod></url><url><loc>https://www.sei.cmu.edu/library/cert-annual-reports-1994-2010/</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-summer-series-2026-sponsorship-guide/</loc><lastmod>2026-04-17</lastmod></url><url><loc>https://www.sei.cmu.edu/library/goal-line-defense-a-tool-to-discover-and-mitigate-uefi-vulnerabilities/</loc><lastmod>2026-04-21</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ai-engineering-twelve-foundational-practices/</loc><lastmod>2026-04-22</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ensuring-the-safety-and-security-of-ai-systems/</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/ensuring-the-safety-and-security-of-ai-systems-slides/</loc><lastmod>2026-04-28</lastmod></url><url><loc>https://www.sei.cmu.edu/library/sei-releases-ai-engineering-practices-to-accelerate-mission-capable-ai-sei-bulletin/</loc><lastmod>2026-04-29</lastmod></url><url><loc>https://www.sei.cmu.edu/library/pack-light-measure-right/</loc><lastmod>2026-05-04</lastmod></url>
</urlset>
