This podcast explores radio frequency attacks, such as those conducted by APT28, and how software and cybersecurity play key roles in preventing and mitigating these exploitations.
This systematic review discusses academic surveys, grey literature sources, and real-world case studies on securing LLM agents.
DeCapria, D., 2024: Introduction to MLOps: Bridging Machine Learning and Operations. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Ozkaya, I., and Schmidt, D., 2024: Generative AI and Software Engineering Education. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Schmidt, D., and Robert, J., 2024: Applying Large Language Models to DoD Software Acquisition: An Initial Experiment. Carnegie Mellon University, Software Engineering ...
Ozkaya, I., and O'Hearn, B., 2024: 5 Recommendations to Help Your Organization Manage Technical Debt. Carnegie Mellon University, Software Engineering Institute's ...
Sherman, M., 2024: Using ChatGPT to Analyze Your Code? Not So Fast. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 3 ...
Robert, J., and Schmidt, D., 2024: 10 Benefits and 10 Challenges of Applying Large Language Models to DoD Software Acquisition. Carnegie Mellon University, Software ...
Novak, W., 2023: Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Clinging to the Old Ways. Carnegie Mellon University, Software Engineering Institute's ...
Wilson, S., Place, P., and Korzec, K., 2023: The Seven Virtues of Reconciling Agile and Earned Value Management (EVM). Carnegie Mellon University, Software ...
Sarvepalli, V., 2023: UEFI: 5 Recommendations for Securing and Restoring Trust. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Churilla, M., VanHoudnos, N., and Beveridge, R., 2023: The Challenge of Adversarial Machine Learning. Carnegie Mellon University, Software Engineering Institute's ...