The twelve foundational practices for decision makers describe the groundwork for turning AI capability into mission value.
Gregory Touhill, CERT Division Director, and Matthew Butkovic, technical director of cyber risk and resilience, co-authored tools for corporate boards dealing with quantum computing, AI, and other ...
This podcast explores updates to the Pointer Ownership Model for C, a modeling framework designed to improve the ability of developers to statically analyze C programs for errors involving temporal ...
Carnegie Mellon University - Software Engineering Institute (“SEI”) is a global institution with operations, campuses, partnerships, and instructional sites in multiple countries. These include the ...
Svoboda, D., and Flynn, L., 2025: AI-Powered Memory Safety with the Pointer Ownership Model. Carnegie Mellon University, Software Engineering Institute's Insights ...
Shevchenko, N., 2024: An Introduction to Model-Based Systems Engineering (MBSE). Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Ozkaya, I., and Schmidt, D., 2024: Generative AI and Software Engineering Education. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Schmidt, D., and Robert, J., 2024: Applying Large Language Models to DoD Software Acquisition: An Initial Experiment. Carnegie Mellon University, Software Engineering ...
Shannon Gallagher discusses findings and recommendations from the Mayflower Project and provides additional background information about LLMs and how they can be engineered for national security use.
Generative artificial intelligence (AI) and large language models (LLMs) have taken the world by storm. The ability of LLMs to perform tasks seemingly on par with humans has led to rapid adoption in a ...
The Insider Threat Vulnerability Assessment (ITVA) is an evidence-based, capability-level assessment. ITVA is designed to measure an organization's preparedness to prevent, detect, and respond to ...