SEI Digital Library
Latest Publications

Malware Research: If You Cannot Replicate it, You Will Not Use It
• Webcast
In this webcast, Leigh Metcalf and Edward Schwartz recommend ways to overcome the problem of replicating and reproducing academic malware research results, so that new and needed concepts and tools …
Watch
Delivering Next Generation Cyber Capabilities to the Warfighter
• Podcast
Gregory Touhill discusses work by CERT researchers and technologists to deliver rapid capabilities to warfighters in the DoD.
Listen
Kubernetes (k8s) in the Air Gap
• White Paper
This paper explains how the act of mirroring the required container images for a k8s deployment in the air gap has become increasingly simplified in the past few years.
Read
Center for Calibrated Trust Measurement and Evaluation (CaTE)—Guidebook for the Development and TEVV of LAWS to Promote Trustworthiness
• White Paper
This guidebook supports personnel in the development and testing of autonomous weapon systems that employ ML, focusing on system reliability and operator trust.
Read
Reference Architecture for Assuring Ethical Conduct in LAWS
• White Paper
This reference architecture provides guidance to reason about designing and developing ML-enabled autonomous systems that have the capability to use lethal force.
Read
Key Takeaways from Zero Trust Industry Day 2024
• White Paper
This paper describes key takeaways from Zero Trust Industry Day 2024.
Read
New Data Exchange Standard Eases Insider Incident Data Collection and Sharing
• Webcast
In this webcast, Austin Whisnant and Dan Costa introduce The Insider Incident Data Exchange Standard (IIDES) that enables researchers and practitioners to easily build insider threat case data and share …
Watch
Getting the Most Out of Your Insider Risk Data with IIDES
• Podcast
Insider incidents cause around 35 percent of data breaches. In this podcast, Austin Whisnant and Dan Costa discuss the Insider Incident Data Expression Standard (IIDES), a new schema for collecting …
Listen
Threat Hunting: What Should Keep All of Us Up at Night
• Webcast
In this webcast, Dan Ruef explains how cybersecurity professionals can stay on task to secure networks and systems even as the big promises of the latest and greatest tools and …
Watch
DoD Work Sponsor User Guide
• User's Guide
The SEI is operated and managed by Carnegie Mellon University as a Federally Funded Research & Development Center. Sponsors fund the SEI's R&D efforts via this contract, which is administered …
Learn More