Publications
The SEI provides access to more than 5,000 documents from three decades of research on best practices in software engineering. These documents include technical reports, presentations, webinars, podcasts, blogs, and other searchable materials. You can search our database to find publications that span the SEI's history as well as current research.
SEI Digital Library
Our digital library holds over 30 years of publications that you can browse by topic, author, and publication type.
Filter by
-
Kubernetes (k8s) in the Air Gap
• White Paper
By Matthew Heckathorn, Maxwell Trdina
This paper explains how the act of mirroring the required container images for a k8s deployment in the air gap has become increasingly simplified in the past few years.
DOWNLOAD -
Center for Calibrated Trust Measurement and Evaluation (CaTE)—Guidebook for the Development and TEVV of LAWS to Promote Trustworthiness
• White Paper
By Tyler Brooks, Andrew O. Mellinger, Daniel Justice, Christopher Fairfax
This guidebook supports personnel in the development and testing of autonomous weapon systems that employ ML, focusing on system reliability and operator trust.
DOWNLOAD -
Reference Architecture for Assuring Ethical Conduct in LAWS
• White Paper
By Tyler Brooks, Andrew O. Mellinger, Eric Heim, Charles Loughin Emily Newman Andrew Schellenberg
This reference architecture provides guidance to reason about designing and developing ML-enabled autonomous systems that have the capability to use lethal force.
DOWNLOAD -
Key Takeaways from Zero Trust Industry Day 2024
• White Paper
By Patsy Bulisco Rhonda Brown
This paper describes key takeaways from Zero Trust Industry Day 2024.
DOWNLOAD -
AI Hygiene Starts with Models and Data Loaders
• White Paper
By Shing-hon Lau, Mahmoud Shabana, Renae Metcalf, Matt Churilla
This paper places a call to action for traditional cybersecurity tools and techniques to be applied to artificial intelligence (AI) for improving the cybersecurity of AI systems.
DOWNLOAD -
Security Engineering Framework (SEF): Managing Security and Resilience Risks Across the Systems Lifecycle
• Special Report
By Carol Woody, Christopher J. Alberts, Michael S. Bandor, Charles M. Wallen, Tom Merendino
The SEF is a collection of software-focused engineering practices for managing security and resilience risks across the systems lifecycle.
DOWNLOAD -
Dangers of AI for Insider Risk Evaluation (DARE)
• White Paper
By Austin Whisnant
This paper describes the challenges and pitfalls of using artificial intelligence for insider risk analysis and how to thoughtfully and efficiently use AI to find insider threats.
DOWNLOAD -
Assurance Evidence of Continuously Evolving Real-Time Systems (ASERT) Workshop 2024
• Special Report
By Bjorn Andersson, Dionisio de Niz, Mark H. Klein, Ronald Koontz (Boeing Company), John Lehoczky (Carnegie Mellon University), Floyd Fazi (Lockheed Martin Corporation), Jonathan Preston (Lockheed Martin Corporation), Hyoseung Kim (University of California, Riverside), George Romanski (Federal Aviation Administration), Daniel Shapiro (Institute of Defense Analysis)
This report summarizes the analysis of the Taiwanese flight CI202 incident from 2020 as well as ideas for future work for ASERT presented at its 2024 workshop.
DOWNLOAD -
Leveraging LLMs for Data Coding
• White Paper
By Declan Kutscher, Austin Whisnant
In this paper, we investigate the usefulness and design methodology of applying large language models (LLMs) to improve and automate the process of coding case data. We introduce tools to …
DOWNLOAD -
Self-Assessment in Training and Exercise
• Technical Report
By Sean Huff, Dustin D. Updyke, Thomas G. Podnar, John Yarger
In this report, the authors introduce an approach to performance evaluation that focuses on self-assessment.
DOWNLOAD