This systematic review discusses academic surveys, grey literature sources, and real-world case studies on securing LLM agents.
Tobar, D., Jamieson, J., Priest, M., and Fricke, J., 2025: 7 Recommendations to Improve SBOM Quality. Carnegie Mellon University, Software Engineering Institute's ...
Gallagher, S., Rallapalli, S., and Brooks, T., 2025: Evaluating LLMs for Text Summarization: An Introduction. Carnegie Mellon University, Software Engineering ...
Shevchenko, N., 2018: Threat Modeling: 12 Available Methods. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 3, 2025 ...
In this webcast, Justin Smith highlights a novel approach to providing independent verification and validation (IV&V) for projects that are using an Agile or iterative software development.
Shevchenko, N., 2024: An Introduction to Model-Based Systems Engineering (MBSE). Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Sherman, M., 2024: Using ChatGPT to Analyze Your Code? Not So Fast. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 3 ...
Robert, J., and Schmidt, D., 2024: 10 Benefits and 10 Challenges of Applying Large Language Models to DoD Software Acquisition. Carnegie Mellon University, Software ...
Mead, N., Woody, C., and Hissam, S., 2024: Measurement Challenges in Software Assurance and Supply Chain Risk Management. Carnegie Mellon University, Software ...
Schmidt, D., and Robert, J., 2024: Applying Large Language Models to DoD Software Acquisition: An Initial Experiment. Carnegie Mellon University, Software Engineering ...
Novak, W., 2023: Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Clinging to the Old Ways. Carnegie Mellon University, Software Engineering Institute's ...
The Insider Threat Program Evaluation (ITPE) is an evidence-based, capability-level assessment. The ITPE is designed to benchmark an organization's insider threat program against a reference model ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results