The SEI Digital Library provides access to more than 3,500 documents from three decades of research into best practices in software engineering. These documents include technical reports, presentations, webinars, podcasts and other materials searchable by user-supplied keywords and organized by topic, publication type, publication year, and author.
This document discusses tools and methods for analyzing the architecture, establishing requirements, evaluating the architecture, and defining the architecture.
In this presentation, Luca Deri discuss flow-based monitoring, troubleshooting, and security using nProbe.
In this presentation, the authors discuss Network Security Monitoring (NSM).
In this presentation, the authors describe SilkWeb and how to analyze silk data through API and Javascript frameworks.
In this presentation, given at FloCon 2017, Jonzy Jones discusses NetFlows and methods to discover illegitimate traffic.
In this podcast, James Edmondson discusses his work to bring distributed artificial intelligence to a next generation, renewable power grid in space.
In this podcast, James Edmondson and Sagar Chaki describe an architecture and approach to engineering high-assurance software for Distributed Adaptive Real-Time (DART) systems.
Researchers in the SEI's CERT Division recently examined the security of a large swath of technology domains being developed in industry and maturing over the next five years.
Learn how to identify network flow characteristics and metrics that support understanding traffic
This webinar describes some of the issues involved in automating the collection and analysis of malware, which has seen exponential growth over the past decade.
For different reasons, usability is generally an afterthought in the cybersecurity tool development process. In this webinar, we teach the audience the value of defining the problem and how this impacts the software quality outcomes.