SEI Digital Library
Latest Publications

DeepSeek V3 and R1: An Overview of Technology Innovations and Implications for the Future
• White Paper
In this white paper, the authors interpret new large language model (LLM) developments using the 2024/2025 releases of DeepSeek V3 and R1 LLMs as a case study.
Read
Will Generative AI Fill the Automation Gap in Software Architecting?
• Article
This paper explores the application of Generative AI to software architecture, focusing on potential alignment (or lack thereof) of Generative AI with the nature of common architecture tasks involved in …
Read
Practical Supervised Machine Learning Classification of Highly Imbalanced Text
• White Paper
In this paper, Austin Whisnant describes a machine learning model used to build a corpus of insider threat data to support insider threat research.
Read
The State of DevSecOps in the DoD: Where We Are, and What’s Next
• Webcast
In this webcast, the SEI’s Brigid O'Hearn and Eileen Wrubel and George Lamb, DoD’s Director of Cloud and Software Modernization, discuss how key findings of The State of DevSecOps in …
Watch
I Spy with My Hacker Eye: How Hackers Use Public Info to Crack Your Creds
• Webcast
In this webcast, Destiney Plaza reveals five ways to protect yourself from getting your password cracked.
Watch
The Best and the Brightest: 6 Years of Supporting the President’s Cup Cybersecurity Competition
• Podcast
The SEI team that supported the Presidents Cup Cybersecurity Competition details their challenges, successes, and lessons learned.
Listen
A New Performance Zone for Software for National Security
• Webcast
In this webcast, Hasan Yasar, Will Hayes, and Joe Yankel assert that software engineering practices are an ingredient that should not be left behind as national security and defense organizations …
Watch
2024 SEI Year in Review
• Annual Report
The 2024 SEI Year in Review highlights the work of the institute undertaken during the fiscal year spanning October 1, 2023, to September 30, 2024.
Read
A Socio-Technical Perspective on Software Vulnerabilities: A Causal Analysis
• Article
This article investigates the causal relationships between the social behaviors of people developing software and effectively maintaining files related to software vulnerabilities.
Read
Identifying and Mitigating Cyber Risk
• Webcast
In this webcast, Matt Butkovic, Greg Crabbe, and Beth-Anne Bygum explore how best to align business and resilience objectives.
Watch