Software Assurance Competency Model
Agile Software Teams: How They Engage with Systems Engineering on DoD Acquisition Programs
Defining a Maturity Scale for Governing Operational Resilience
Measuring What Matters Workshop Report
Pattern-Based Design of Insider Threat Programs
Patterns and Practices for Future Architectures
A Systematic Approach for Assessing Workforce Readiness
Evaluation of the Applicability of HTML5 for Mobile Applications in Resource-Constrained Edge Environments
A Taxonomy of Operational Cyber Security Risks Version 2
An Evaluation of A-SQUARE for COTS Acquisition
Investigating Advanced Persistent Threat 1 (APT1)
Potential Use of Agile Methods in Selected DoD Acquisitions: Requirements Development and Management
International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany
Wireless Emergency Alerts (WEA) Cybersecurity Risk Management Strategy for Alert Originators
CERT® Resilience Management Model (CERT®-RMM) V1.1: NIST Special Publication 800-66 Crosswalk
Insider Threat Control: Using Plagiarism Detection Algorithms to Prevent Data Exfiltration in Near Real Time
Introduction to the Mission Thread Workshop
Isolating Patterns of Failure in Department of Defense Acquisition
Socio-Adaptive Systems Challenge Problems Workshop Report
Quantifying Uncertainty in Expert Judgment: Initial Results