Tiger team

Known as: Tiger teams, Tigger Team 
A tiger team is a diversified group of experts brought together for a single project, need, or event. They are usually assigned to investigate, solve… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1988-2015
012319882015

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Space flight projects typically bring with them a demanding schedule, deep technical challenges, and diverse personalities. As… (More)
  • table 1
  • figure 1
Is this relevant?
2011
2011
Dr. Jason Lawrence is an Assistant Professor in the Department of Computer Science. He is a lead researcher on an NSF-funded… (More)
Is this relevant?
2009
2009
The Performance Engineering Institute (PERI) originally proposed a tiger team activity as a mechanism to target significant… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2005
2005
This publication contains reprint articles for which IEEE does not hold copyright. Full text is not available on IEEE Xplore for… (More)
Is this relevant?
2000
2000
Preliminary analysis of data collected from trained expert facilitators of ad hoc creative teams suggests that complex analytical… (More)
  • figure 1
  • table 1
Is this relevant?
1999
1999
Security vulnerabilities that affect widely deployed software emerge frequently. Addressing these maladies requires coordination… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table B.1
Is this relevant?
1998
1998
The DASHER Project at USC/ISI has focused upon helping organizations with rapid-response mission requirements. Such organizations… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1998
1998
In the commercial sector, security analysis has traditionally been applied at the network system level, after release, using… (More)
Is this relevant?
1996
1996
We describe an approach and tool for analyzing the vulnerability of software applications to anomalous events and malicious… (More)
Is this relevant?
1988
1988
 
Is this relevant?