<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | System Verification and Validation</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching System Verification and Validation</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/system-verification-and-validation/atom/" rel="self"/><language>en-us</language><lastBuildDate>Thu, 13 Feb 2020 00:00:00 -0500</lastBuildDate><item><title>Comments on NIST IR 8269: A Taxonomy and Terminology of Adversarial Machine Learning</title><link>https://www.sei.cmu.edu/blog/comments-on-nist-ir-8269-a-taxonomy-and-terminology-of-adversarial-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The U.S. National Institute of Standards and Technology (NIST) recently held a public comment period on their draft report on proposed taxonomy and terminology of Adversarial Machine Learning (AML)....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jonathan Spring</dc:creator><pubDate>Thu, 13 Feb 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/comments-on-nist-ir-8269-a-taxonomy-and-terminology-of-adversarial-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>System Verification and Validation</category><category>Mission Assurance</category></item><item><title>Improving Insider Threat Detection Methods Through Software Engineering Principles</title><link>https://www.sei.cmu.edu/blog/improving-insider-threat-detection-methods-through-software-engineering-principles/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Tuning detective controls is a key component of implementing and operating an insider threat program, and one we have seen many organizations struggle with....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dan Costa</dc:creator><pubDate>Fri, 20 Sep 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/improving-insider-threat-detection-methods-through-software-engineering-principles/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>System Verification and Validation</category></item><item><title>Enabling Shift-Left Testing from Small Teams to Large Systems</title><link>https://www.sei.cmu.edu/blog/enabling-shift-left-testing-from-small-teams-to-large-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Shift left is a familiar exhortation to teams and organizations engaged in Agile and Lean software development. It most commonly refers to incorporating test practices....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nanette Brown</dc:creator><pubDate>Mon, 18 Mar 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/enabling-shift-left-testing-from-small-teams-to-large-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>System Verification and Validation</category><category>Testing</category><category>Agile</category></item><item><title>The Modern Software Factory and Independent V&amp;V for Machine Learning: Two Key Recommendations for Improving Software in Defense Systems</title><link>https://www.sei.cmu.edu/blog/the-modern-software-factory-and-independent-vv-for-machine-learning-two-key-recommendations-for-improving-software-in-defense-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post highlights recommendations from a Defense Science Board report on how to improve software acquisition in defense.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Paul Nielsen</dc:creator><pubDate>Mon, 25 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/the-modern-software-factory-and-independent-vv-for-machine-learning-two-key-recommendations-for-improving-software-in-defense-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>System Verification and Validation</category></item><item><title>Rapid Software Composition by Assessing Untrusted Components</title><link>https://www.sei.cmu.edu/blog/rapid-software-composition-by-assessing-untrusted-components/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Today, organizations build applications on top of existing platforms, frameworks, components, and tools; no one constructs software from scratch....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rick Kazman</dc:creator><pubDate>Mon, 26 Nov 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/rapid-software-composition-by-assessing-untrusted-components/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Software Architecture</category><category>System Verification and Validation</category></item><item><title>Certifiable Distributed Runtime Assurance in Cyber-Physical Systems</title><link>https://www.sei.cmu.edu/blog/certifiable-distributed-runtime-assurance-in-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Runtime assurance (RA) has become a promising technique for ensuring the safe behavior of autonomous systems (such as drones or self-driving vehicles) whose behavior cannot be fully determined at design time....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dionisio de Niz</dc:creator><pubDate>Mon, 16 Jul 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/certifiable-distributed-runtime-assurance-in-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>System Verification and Validation</category></item><item><title>Infrastructure as Code: Moving Beyond DevOps and Agile</title><link>https://www.sei.cmu.edu/blog/infrastructure-as-code-moving-beyond-devops-and-agile/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Citing the need to provide a technical advantage to the warfighter, the Department of Defense (DoD) has recently made the adoption of cloud computing technologies a priority....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">John Klein</dc:creator><pubDate>Mon, 11 Jun 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/infrastructure-as-code-moving-beyond-devops-and-agile/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Devops</category><category>Cloud Computing</category><category>Software and Information Assurance</category><category>System Verification and Validation</category><category>Agile</category></item><item><title>Why Is Measurement So Hard?</title><link>https://www.sei.cmu.edu/blog/why-is-measurement-so-hard/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Developing security metrics within an organization is an ongoing challenge. Organizations want to know "Am I secure enough?" While this is the common question, it lacks context....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Katie Stewart</dc:creator><pubDate>Wed, 28 Feb 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/why-is-measurement-so-hard/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>System Verification and Validation</category></item><item><title>Bitcoin, Blockchain, Machine Learning, and Ransomware: The Top 10 Posts of 2017</title><link>https://www.sei.cmu.edu/blog/bitcoin-blockchain-machine-learning-and-ransomware-the-top-10-posts-of-2017/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Each year since the blog's inception, we present the 10 most-visited posts of the year in descending order ending with the most popular post. In this blog post, we present the 10 most popular posts published between January 1, 2017 and December 31, 2017.10....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 08 Jan 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/bitcoin-blockchain-machine-learning-and-ransomware-the-top-10-posts-of-2017/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Blockchain</category><category>Autonomy and Counter-Autonomy</category><category>Cyber Missions</category><category>System Verification and Validation</category><category>Best Practices in Network Security</category><category>Mission Assurance</category></item><item><title>Cyber Warfare, Technical Debt, Network Border Protection, and Insider Threat: The Latest Work from the SEI</title><link>https://www.sei.cmu.edu/blog/cyber-warfare-technical-debt-network-border-protection-and-insider-threat-the-latest-work-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post highlights recent SEI publications in cyber warfare, emerging technologies, network protection, and more.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 27 Nov 2017 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/cyber-warfare-technical-debt-network-border-protection-and-insider-threat-the-latest-work-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Insider Threat</category><category>System Verification and Validation</category><category>Artificial Intelligence</category><category>Data Modeling and Analytics</category></item></channel></rss>