-
Early 2026 Publication Venue Map

Timeline and quick-win checklist for submitting to IEEE and ISACA venues before Q2 deadlines.
-
Choosing Threat-Modeling-as-Code or PlatformHead-to-head comparison of open-source frameworks and commercial tools for CI/CD-driven threat modeling.
-
Runnable CI/CD Threat-Model Pilot
Two-week sprint to automate PyTM or ThreatSpec models, enrich to ATT&CK, and export STIX artifacts for SOC use.
-
AI-Driven Dependency Triage FramewoAutomated gate criteria using Scorecard, SLSA, and AI-risk scoring to prioritize human review of dependencies.rk
-
Detecting CI Anomalies with ProvenanFramework to pair anomaly detection models with provenance enforcement for reliable build integrity.ce Gates
-
Comparing Cloud Workload Identity StandardCross-walk between SPIFFE/SPIRE, OIDC Federation, and Sigstore mapped to Azure, AWS, and GCP identity patterns.s
-
Mapping Controls Across AI Trust StandardSix concrete checkpoints linking NIST AI RMF tasks to SLSA, in-toto, ML-BOM, and runtime identity enforcement.s
-
End-to-End Attestation for AI Pipelines
Practical guide to binding dataset lineage, signed models, and runtime checks into a verifiable trust chain.
-
Network Patterns for Regulated AI
Decision table comparing Private Endpoints, Service Endpoints, and VNet injection for compliance and performance trade-offs.
-
Embedding Enforcement Hooks in CI/CDStep-by-step enforcement pattern with Azure Policy and DeployIfNotExists to auto-provision secure network controls.