Publications
The SEI provides access to more than 5,000 documents from three decades of research on best practices in software engineering. These documents include technical reports, presentations, webinars, podcasts, blogs, and other searchable materials. You can search our database to find publications that span the SEI's history as well as current research.
SEI Digital Library
Our digital library holds over 30 years of publications that you can browse by topic, author, and publication type.
Filter by
-
Practical Supervised Machine Learning Classification of Highly Imbalanced Text
• White Paper
By Austin Whisnant
In this paper, Austin Whisnant describes a machine learning model used to build a corpus of insider threat data to support insider threat research.
DOWNLOAD -
Kubernetes (k8s) in the Air Gap
• White Paper
By Matthew Heckathorn, Maxwell Trdina
This paper explains how the act of mirroring the required container images for a k8s deployment in the air gap has become increasingly simplified in the past few years.
DOWNLOAD -
Center for Calibrated Trust Measurement and Evaluation (CaTE)—Guidebook for the Development and TEVV of LAWS to Promote Trustworthiness
• White Paper
By Tyler Brooks, Daniel Justice, Andrew O. Mellinger, Christopher Fairfax
This guidebook supports personnel in the development and testing of autonomous weapon systems that employ ML, focusing on system reliability and operator trust.
DOWNLOAD -
Reference Architecture for Assuring Ethical Conduct in LAWS
• White Paper
By Eric Heim, Andrew Schellenberg, Charles Loughin, Tyler Brooks, Andrew O. Mellinger, Emily Newman
This reference architecture provides guidance to reason about designing and developing ML-enabled autonomous systems that have the capability to use lethal force.
DOWNLOAD -
Key Takeaways from Zero Trust Industry Day 2024
• White Paper
By Rhonda Brown, Patsy Bulisco
This paper describes key takeaways from Zero Trust Industry Day 2024.
DOWNLOAD -
AI Hygiene Starts with Models and Data Loaders
• White Paper
By Matt Churilla, Mahmoud Shabana, Shing-hon Lau, Renae Metcalf
This paper places a call to action for traditional cybersecurity tools and techniques to be applied to artificial intelligence (AI) for improving the cybersecurity of AI systems.
DOWNLOAD -
Security Engineering Framework (SEF): Managing Security and Resilience Risks Across the Systems Lifecycle
• Special Report
By Michael S. Bandor, Christopher J. Alberts, Charles M. Wallen, Carol Woody, Tom Merendino
The SEF is a collection of software-focused engineering practices for managing security and resilience risks across the systems lifecycle.
DOWNLOAD -
Dangers of AI for Insider Risk Evaluation (DARE)
• White Paper
By Austin Whisnant
This paper describes the challenges and pitfalls of using artificial intelligence for insider risk analysis and how to thoughtfully and efficiently use AI to find insider threats.
DOWNLOAD -
Assurance Evidence of Continuously Evolving Real-Time Systems (ASERT) Workshop 2024
• Special Report
By Mark H. Klein, John Lehoczky (Carnegie Mellon University), Ronald Koontz (Boeing Company), Dionisio de Niz, Bjorn Andersson, Jonathan Preston (Lockheed Martin Corporation), Floyd Fazi (Lockheed Martin Corporation), George Romanski (Federal Aviation Administration), Daniel Shapiro (Institute of Defense Analysis), Hyoseung Kim (University of California, Riverside)
This report summarizes the analysis of the Taiwanese flight CI202 incident from 2020 as well as ideas for future work for ASERT presented at its 2024 workshop.
DOWNLOAD -
Leveraging LLMs for Data Coding
• White Paper
By Declan Kutscher, Austin Whisnant
In this paper, we investigate the usefulness and design methodology of applying large language models (LLMs) to improve and automate the process of coding case data. We introduce tools to …
DOWNLOAD