<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Human-Machine Interactions</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Human-Machine Interactions</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/human-machine-interactions/atom/" rel="self"/><language>en-us</language><lastBuildDate>Wed, 20 Apr 2022 00:00:00 -0400</lastBuildDate><item><title>Six Dimensions of Trust in Autonomous Systems</title><link>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post chronicles the adoption and growth of autonomous systems and provides six considerations for establishing trust.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Paul Nielsen</dc:creator><pubDate>Wed, 20 Apr 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Software Assurance</category><category>Vulnerability Discovery</category><category>Devops</category><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Cybersecurity</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>Human-Machine Interactions</category><category>Artificial Intelligence</category><category>Digital Engineering</category><category>Cyber-Physical Systems</category></item><item><title>Expectations for Implementing DevOps in a Highly Regulated Environment: Second in a Series</title><link>https://www.sei.cmu.edu/blog/expectations-for-implementing-devops-in-a-highly-regulated-environment-second-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This second installment in the blog post series on implementing DevOps in highly regulated environments (HREs), which is excerpted from a recently published paper, discusses the first step in a DevOps assessment....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">José Morales</dc:creator><pubDate>Fri, 08 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/expectations-for-implementing-devops-in-a-highly-regulated-environment-second-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Devops</category><category>Human-Machine Interactions</category><category>Mission Assurance</category><category>Continuous Deployment of Capability</category></item><item><title>Best Practices in Network Traffic Analysis: Three Perspectives</title><link>https://www.sei.cmu.edu/blog/best-practices-in-network-traffic-analysis-three-perspectives/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In July of this year, a major overseas shipping company had its U.S. operations disrupted by a ransomware attack, one of the latest attacks to disrupt the daily operation of a major, multi-national organization....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman, Timothy Shimeall, Timur Snoke</dc:creator><pubDate>Mon, 08 Oct 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/best-practices-in-network-traffic-analysis-three-perspectives/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Human-Machine Interactions</category><category>Cyber Missions</category><category>Best Practices in Network Security</category></item><item><title>Obsidian: A New, More Secure Programming Language for Blockchain</title><link>https://www.sei.cmu.edu/blog/obsidian-a-new-more-secure-programming-language-for-blockchain/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Billions of dollars in venture capital, industry investments, and government investments are going into the technology known as blockchain....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eliezer Kanal</dc:creator><pubDate>Tue, 04 Sep 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/obsidian-a-new-more-secure-programming-language-for-blockchain/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Cybersecurity</category><category>Secure Development</category><category>Human-Machine Interactions</category><category>Advanced Computing</category><category>Blockchain</category></item><item><title>Introducing Atlas: A Prototype for Visualizing the Internet</title><link>https://www.sei.cmu.edu/blog/introducing-atlas-a-prototype-for-visualizing-the-internet/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>After 30 years, cyber command centers, educators, and Internet threat intelligence organizations have yet to embrace a standardized, encompassing, and intuitive way to represent the entities and activities of the Internet....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Gardner</dc:creator><pubDate>Thu, 22 Mar 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/introducing-atlas-a-prototype-for-visualizing-the-internet/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Human-Machine Interactions</category><category>Insider Threat</category></item><item><title>Best Practices for Cloud Security</title><link>https://www.sei.cmu.edu/blog/best-practices-for-cloud-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>As detailed in last week's post, SEI researchers recently identified a collection of vulnerabilities and risks faced by organizations moving data and applications to the cloud....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Donald Faatz</dc:creator><pubDate>Mon, 12 Mar 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/best-practices-for-cloud-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Best Practices in Network Security</category><category>Cloud Computing</category><category>Human-Machine Interactions</category></item><item><title>Revealing True Emotions Through Micro-Expressions: A Machine Learning Approach</title><link>https://www.sei.cmu.edu/blog/revealing-true-emotions-through-micro-expressions-a-machine-learning-approach/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Micro-expressions--involuntary, fleeting facial movements that reveal true emotions--hold valuable information for scenarios ranging from security interviews and interrogations to media analysis....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Satya Venneti</dc:creator><pubDate>Mon, 15 Jan 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/revealing-true-emotions-through-micro-expressions-a-machine-learning-approach/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence</category><category>Biometrics</category><category>Human-Machine Interactions</category><category>Machine Learning</category><category>Artificial Intelligence Engineering</category></item><item><title>Machine Learning and Insider Threat</title><link>https://www.sei.cmu.edu/blog/machine-learning-and-insider-threat/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post discusses machine learning in detecting insider threats, benefits of early detection, and importance of comprehensive insider threat programs.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dan Costa</dc:creator><pubDate>Mon, 16 Oct 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/machine-learning-and-insider-threat/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Insider Threat</category><category>Human-Machine Interactions</category><category>Artificial Intelligence</category></item><item><title>What Is Bitcoin? What Is Blockchain?</title><link>https://www.sei.cmu.edu/blog/what-is-bitcoin-what-is-blockchain/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post introduces and explains the fundamentals of Bitcoin and Blockchain technology.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eliezer Kanal</dc:creator><pubDate>Mon, 24 Jul 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/what-is-bitcoin-what-is-blockchain/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Human-Machine Interactions</category><category>Blockchain</category></item><item><title>Machine Learning in Cybersecurity</title><link>https://www.sei.cmu.edu/blog/machine-learning-in-cybersecurity/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this post I introduce the concept of machine learning, explain how machine learning is applied in practice, and touch on its application to cybersecurity throughout the article.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eliezer Kanal</dc:creator><pubDate>Mon, 05 Jun 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/machine-learning-in-cybersecurity/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>CERT/CC</category><category>Software and Information Assurance</category><category>Human-Machine Interactions</category><category>Cyber Missions</category><category>Artificial Intelligence</category></item><item><title>Three Practice Areas for Using Positive Incentives to Reduce Insider Threat</title><link>https://www.sei.cmu.edu/blog/three-practice-areas-for-using-positive-incentives-to-reduce-insider-threat/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover a holistic approach to mitigating insider threats and three practices for reducing them in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Andrew Moore</dc:creator><pubDate>Mon, 27 Mar 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/three-practice-areas-for-using-positive-incentives-to-reduce-insider-threat/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Human-Machine Interactions</category><category>Insider Threat</category><category>Cyber Missions</category></item><item><title>Real-Time Extraction of Biometric Data from Video</title><link>https://www.sei.cmu.edu/blog/real-time-extraction-of-biometric-data-from-video/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post showcases real-time algorithms developed by the Emerging Technology Center to extract heart rate from video of moving subjects.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Satya Venneti</dc:creator><pubDate>Mon, 22 Aug 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/real-time-extraction-of-biometric-data-from-video/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Artificial Intelligence</category><category>Emerging Technologies</category><category>Biometrics</category><category>Human-Machine Interactions</category></item></channel></rss>