Channel Avatar

Software Engineering Institute | Carnegie Mellon University @UCrmnnE3yzpAyAuX_hRqyLdg@youtube.com

None subscribers - no pronouns set

The Leader in Software Engineering, Cybersecurity, and AI En


26:25
Safeguarding Against Recent Vulnerabilities Related to Rust
30:51
Developing a Global Network of Computer Security Incident Response Teams (CSIRTs)
01:05:39
Zero Trust Industry Day 2024: Panel Discussion
45:14
Cyolo Materials for Zero Trust Industry Day 2024
44:50
Zentera Systems Materials for Zero Trust Industry Day 2024
59:14
NetFoundry Materials for Zero Trust Industry Day 2024
57:17
Cimcor Materials for Zero Trust Industry Day 2024
57:36
Zscaler Materials for Zero Trust Industry Day 2024
22:47
Zero Trust Industry Day 2024: Keynote Presentation
27:05
Automated Repair of Static Analysis Alerts
31:23
Cyber Career Pathways and Opportunities
01:24
The Future of Work: How to Build an AI-Ready Workforce
01:14
Meet the SEI at RSA 2024
37:15
My Story in Computing with Sam Procter
37:37
Developing and Using a Software Bill of Materials Framework
29:02
The Importance of Diversity in Software Engineering: Suzanne Miller
26:37
The Importance of Diversity in Cybersecurity: Carol Ware
16:57
The Importance of Diversity in Artificial Intelligence: Violet Turri
34:45
Using Large Language Models in the National Security Realm
03:00
Exploring the Pros and Cons of Large Language Models for Intelligence Community Tasks
33:41
Atypical Applications of Agile and DevSecOps Principles
35:20
When Agile and Earned Value Management Collide: 7 Considerations for Successful Interaction
34:05
The Impact of Architecture on Cyber-Physical Systems Safety
30:28
Exploring Emerging Cybersecurity Topics
46:22
ChatGPT and the Evolution of Large Language Models: A Deep Dive into 4 Transformative Case Studies
23:01
The Cybersecurity of Quantum Computing: 6 Areas of Research
10:35
FloCon 2022: Introduction to Discord
01:00:36
Keynote Presentation: NIDS is Dead, Long Live NIDS!
25:34
Quantifying the Impact of Encrypted DNS for Network Defenders
26:22
Improving Cyber Resiliency through Microsegmentation Policy Optimization
35:20
ML-Driven New Account Fraud Early Detection System
32:40
What Do We Mean by a Science of Security?
28:49
Traditional and Advanced Techniques for Network Beacon Detection
27:30
Generating Known Unknowns through Known Knowns
38:32
Above our Heads: How Attackers are Leveraging the Cloud
58:10
Keynote Presentation: Journey to Protecting Data & Information Networks
26:04
Self-Modulating Endpoint Observability
29:11
Sensing in Hybrid Clouds
29:11
Managing Cyber Risks: Express Control Impact and Risk Analysis (ECI & RA)
26:21
Collaborative Botnet Detection through Large-scale Network Traffic
31:41
User-Centric Metrics for Agile
24:19
The Product Manager’s Evolving Role in Software and Systems Development
01:29
Formal Arguments for Large-Scale Assurance (FALSA) Promo
01:19
Co-Design for Edge AI: Application-Specific System on Chip Promo
19:55
Moving Explainable Artificial Intelligence from Research to Practice: Defining and Validating
19:22
Co-Design for Edge AI: Application-Specific System on Chip
18:46
Detection of Malicious Code Using Static Taint Analysis
15:22
Building an SOC Knowledge Base
19:51
Leveraging Adversarial Machine Learning Techniques to Perform Query-Access Fairness Evaluations
01:23
Leveraging Adversarial Machine Learning Techniques to Perform Query Access Fairness Evals Promo
01:38
Portend: Drift Planning in ML Systems Promo
16:27
Portend: Drift Planning in ML Systems
01:38
Building an SOC Knowledge Base Promo
01:45
Applied Automated Repair of Static Analysis Alerts Promo
01:44
Detection of Malicious Code Using Static Taint Analysis Promo
21:23
Formal Arguments for Large-Scale Assurance (FALSA)
24:36
Applied Automated Repair of Static Analysis Alerts
17:58
Software Architecture for Systems that Use Quantum Computers
01:20
Software Architecture for Systems that Use Quantum Computers Promo
01:39
Moving Explainable Artificial Intelligence from Research to Practice: Defining and Validating Promo