Digital Library

The SEI publishes extensively to connect with and deliver our most recent advancements in software engineering, cyber, artificial intelligence, and acquisition transformation to the software community. We publish our research in elite journals, and we also produce technical reports, white papers, webcasts, and much more—all of which we make available in our digital library. We’ve collected thousands of publications over decades of research that you can download today.

Search the digital library

Get our latest innovations in your inbox

Subscribe to SEI Bulletin

or follow us on social media

Technical Papers

Blog Posts

From Reality to Virtual Reality: The Impact of 3DGS on Training, Education, and Beyond

This blog post describes cutting-edge method for creating digital models of the physical world called 3D Gaussian Splatting.

Assessing the Feasibility and Advisability of a Civilian Cybersecurity Reserve

This post highlights recent work by SEI researchers on behalf of the Department of War to assess the feasibility and advisability of a civilian cybersecurity …

The Five Pillars of Software Assurance in System Acquisition

This post presents five foundational capabilities to support the acquisition of a system with effective software assurance.

An Approach to Accelerate Verification and Software Standards Testing with LLMs

This post highlights the work of SEI researchers who sought to prove that LLMs can be used in unclassified environments to rapidly develop tools that …

Podcasts

youtube_thumb_EooWBWq8sd8
Leadership, Legacy, and the Power of Mentors: Insights from Dr. Paul Nielsen
Paul Nielsen, the SEI's director and chief executive officer, discusses his legacy, the impact of mentors, and the importance of encouraging scientists and engineers to …
youtube_thumb_laE-qxOt2yM
With a Little Help from Our Civilian Friends: Cybersecurity Reserve Is Both Feasible and Advisable
The Pentagon commissioned the SEI to assess the feasibility and advisability of creating a civilian cybersecurity reserve that could harness cyber expertise from the private …
youtube_thumb_v3nFOQldrDQ
Maturing AI Adoption: From Chaos to Consistency
Our latest podcast highlights an AI Adoption Maturity Model that organizations can use to create a roadmap for predictable AI adoption and realization of AI …
youtube_thumb_pP2bAtsJ8zE
Temporal Memory Safety in C and C++: An AI-Enhanced Pointer Ownership Model
This podcast explores updates to the Pointer Ownership Model for C, a modeling framework designed to improve the ability of developers to statically analyze C …

Webcasts

Latest webcasts

Tools for Building an AI-Enabled SOC
In this webcast, Justin Novak and Christopher Ian Rodman discuss how AI can be leveraged to build out and enable your security operations center (SOC) …
youtube_thumb_jLhqW4TaCU0
Software Acquisition Go Bag: Cracking the CNS Code
In this webcast, Brigid O’Hearn, Christina Rhylander, and Julie Cohen provide you with the practical insight you need to develop a Capability Needs Statement (CNS) …
youtube_thumb_DE36T_Bgm8Q
Acquisition Oversight for Software Assurance
In this webcast, Dr. Carol Woody and Michael Bandor discuss key software assurance activities that must be embedded within the acquisition lifecycle to be effective.
youtube_thumb_vzhOg2867a8
Leveraging AI to Build Cyber Capacity
In this webcast, SEI researchers explore the current challenges and emerging solutions for building and sustaining cyber and AI-ready individuals and teams.