Technical Papers
The SEI Digital Library houses thousands of technical papers and other documents, ranging from SEI Technical Reports on groundbreaking research to conference proceedings, survey results, and source code.
Filter by
-
Report on the First MBSynergy Workshop
• Technical Report
By Jerome Hugues, Will Hayes, Peter Capell, Nataliya Shevchenko
MBSynergy research focuses on ways of pursuing government equities using MBSE and digital engineering in DoD and IC settings; this report describes this team’s first working session.
DOWNLOAD -
Software Bill of Materials (SBOM) Harmonization Plugfest 2024
• Special Report
By David Tobar, Jessie Jamieson, Jason Fricke, Sasank Vishnubhatla, Mark Priest
In this report, the authors describe the research findings and recommendations that resulted from the 2024 Software Bill of Materials (SBOM) Harmonization Plugfest research project.
DOWNLOAD -
What Can Generative AI Red-Teaming Learn from Cyber Red-Teaming?
• Technical Report
By Ellie Soto, Michael Feffer, Keltin Grimes, James Lucassen Anusha Sinha, Nathan M. VanHoudnos, Hoda Heidari
This paper investigates the applicability of established cyber red-teaming methodologies to the evaluation of generative AI systems, addressing the growing need for robust security assessments in AI-driven applications.
DOWNLOAD -
Practical Supervised Machine Learning Classification of Highly Imbalanced Text
• White Paper
By Austin Whisnant
In this paper, Austin Whisnant describes a machine learning model used to build a corpus of insider threat data to support insider threat research.
DOWNLOAD -
Observational Human–AI (OHAI): A Defender Attribution Framework for Distinguishing Human vs. AI Threats
• White Paper
By Dustin D. Updyke, David Rossell, Shelly Fitzgerald
OHAI is a proposed framework for providing probabilistic human‑to‑autonomous attribution in cyber incidents.
DOWNLOAD -
Kubernetes (k8s) in the Air Gap
• White Paper
By Maxwell Trdina, Matthew Heckathorn
This paper explains how the act of mirroring the required container images for a k8s deployment in the air gap has become increasingly simplified in the past few years.
DOWNLOAD -
Center for Calibrated Trust Measurement and Evaluation (CaTE)—Guidebook for the Development and TEVV of LAWS to Promote Trustworthiness
• White Paper
By Daniel Justice, Tyler Brooks, Andrew O. Mellinger, Christopher Fairfax
This guidebook supports personnel in the development and testing of autonomous weapon systems that employ ML, focusing on system reliability and operator trust.
DOWNLOAD -
Reference Architecture for Assuring Ethical Conduct in LAWS
• White Paper
By Eric Heim, Andrew O. Mellinger, Tyler Brooks, Andrew Schellenberg, Charles Loughin, Emily Newman
This reference architecture provides guidance to reason about designing and developing ML-enabled autonomous systems that have the capability to use lethal force.
DOWNLOAD -
Key Takeaways from Zero Trust Industry Day 2024
• White Paper
By Patsy Bulisco, Rhonda Brown
This paper describes key takeaways from Zero Trust Industry Day 2024.
DOWNLOAD -
AI Hygiene Starts with Models and Data Loaders
• White Paper
By Matt Churilla, Shing-hon Lau, Mahmoud Shabana, Renae Metcalf
This paper places a call to action for traditional cybersecurity tools and techniques to be applied to artificial intelligence (AI) for improving the cybersecurity of AI systems.
DOWNLOAD