Digital Library

The SEI publishes extensively to connect with and deliver our most recent advancements in software engineering, cyber, artificial intelligence, and acquisition transformation to the software community. We publish our research in elite journals, and we also produce technical reports, white papers, webcasts, and much more—all of which we make available in our digital library. We’ve collected thousands of publications over decades of research that you can download today.

Search the digital library

Get our latest innovations in your inbox

Subscribe to SEI Bulletin

or follow us on social media

Technical Papers

Blog Posts

From Reality to Virtual Reality: The Impact of 3DGS on Training, Education, and Beyond

This blog post describes cutting-edge method for creating digital models of the physical world called 3D Gaussian Splatting.

Assessing the Feasibility and Advisability of a Civilian Cybersecurity Reserve

This post highlights recent work by SEI researchers on behalf of the Department of War to assess the feasibility and advisability of a civilian cybersecurity …

The Five Pillars of Software Assurance in System Acquisition

This post presents five foundational capabilities to support the acquisition of a system with effective software assurance.

An Approach to Accelerate Verification and Software Standards Testing with LLMs

This post highlights the work of SEI researchers who sought to prove that LLMs can be used in unclassified environments to rapidly develop tools that …

Podcasts

Leadership, Legacy, and the Power of Mentors: Insights from Dr. Paul Nielsen
Leadership, Legacy, and the Power of Mentors: Insights from Dr. Paul Nielsen
Paul Nielsen, the SEI's director and chief executive officer, discusses his legacy, the impact of mentors, and the importance of encouraging scientists and engineers to …
With a Little Help from Our Civilian Friends: Cybersecurity Reserve Is Both Feasible and Advisable
With a Little Help from Our Civilian Friends: Cybersecurity Reserve Is Both Feasible and Advisable
The Pentagon commissioned the SEI to assess the feasibility and advisability of creating a civilian cybersecurity reserve that could harness cyber expertise from the private …
Maturing AI Adoption: From Chaos to Consistency
Maturing AI Adoption: From Chaos to Consistency
Our latest podcast highlights an AI Adoption Maturity Model that organizations can use to create a roadmap for predictable AI adoption and realization of AI …
Temporal Memory Safety in C and C++: An AI-Enhanced Pointer Ownership Model
Temporal Memory Safety in C and C++: An AI-Enhanced Pointer Ownership Model
This podcast explores updates to the Pointer Ownership Model for C, a modeling framework designed to improve the ability of developers to statically analyze C …

Webcasts

Latest webcasts

Tools for Building an AI-Enabled SOC
Tools for Building an AI-Enabled SOC
In this webcast, Justin Novak and Christopher Ian Rodman discuss how AI can be leveraged to build out and enable your security operations center (SOC) …
Software Acquisition Go Bag: Cracking the CNS Code
Software Acquisition Go Bag: Cracking the CNS Code
In this webcast, Brigid O’Hearn, Christina Rhylander, and Julie Cohen provide you with the practical insight you need to develop a Capability Needs Statement (CNS) …
Acquisition Oversight for Software Assurance
Acquisition Oversight for Software Assurance
In this webcast, Dr. Carol Woody and Michael Bandor discuss key software assurance activities that must be embedded within the acquisition lifecycle to be effective.
Leveraging AI to Build Cyber Capacity
Leveraging AI to Build Cyber Capacity
In this webcast, SEI researchers explore the current challenges and emerging solutions for building and sustaining cyber and AI-ready individuals and teams.

Vulnerability Notes

The SEI builds relationships with software vendors and other organizations to coordinate prompt responses to possible risks or threats that arise from software vulnerabilities. Over the years, we have built an extensive vendor network, and we work as a trusted broker to identify, disclose, and mitigate vulnerabilities. As part of this effort, we publish vulnerability notes to keep the community informed and to enable effective and swift mitigation.