SEI Digital Library
Latest Publications
Self-Assessment in Training and Exercise
• Technical Report
By Dustin D. Updyke , Thomas G. Podnar , John Yarger , Sean Huff
In this report, the authors introduce an approach to performance evaluation that focuses on self-assessment.
ReadRedemption Demo: Use Microsoft Visual Studio Code to View Redemption Repairs: Ignore, Accept, Revert
• Video
By David Svoboda
This brief video shows the use of Microsoft Visual Studio Code to easily view the SEI Redemption tool’s repairs to the code and to easily revert any of the repairs.
WatchResults of ChatGPT Analysis of Java and C++
• Dataset
By David Schulker
Results of 2024 analysis of CERT Secure Coding Rules for C++ and Java with ChatGPT 3.5 and ChatGPT-4o.
DownloadCybersecurity Metrics: Protecting Data and Understanding Threats
• Podcast
By Bill Nichols
Scoping down objectives and determining what kinds of data to gather are persistent challenges in cybersecurity. Bill Nichols explores cyber metrics in our latest podcast.
ListenFrom Chaos to Clarity: Conceptual Modeling for Complex Systems
• Webcast
By Hasan Yasar
In this webcast, Dr. Wolfgang Maass, Dr. Hyoil Han, and Hasan Yasar discuss key principles of conceptual modeling and explore its significance in various domains and its role in driving …
WatchRedemption Tool Demo Video: Separate Environments for Code Compilation and Code Repair
• Video
By Lori Flynn , David Svoboda , Rebecca Beliak
This video shows the manual review of the code repairs done by Redemption in a terminal.
WatchCounter AI: What Is It and What Can You Do About It?
• White Paper
By Nathan M. VanHoudnos , Carol J. Smith , Matt Churilla , Shing-hon Lau , Lauren McIlvenny , Greg Touhill
This paper describes counter artificial intelligence (AI) and provides recommendations on what can be done about it.
Read3 Key Elements for Designing Secure Systems
• Podcast
By Timothy A. Chick
To make secure software by design a reality, engineers must intentionally build security throughout the software development lifecycle.
ListenTerrain in Cyberspace Operations—Terminology
• White Paper
By Vincent LaPiana , Nathaniel Richmond
This paper defines several terms used to describe cyber operations and how they relate to other terms important to military operations and mission planning.
ReadUsing Role-Playing Scenarios to Identify Bias in LLMs
• Podcast
By Katherine-Marie Robinson , Violet Turri
Harmful biases in large language models (LLMs) make AI less trustworthy and secure. Katie Robinson and Violet Turri discuss their recent work using role-playing game scenarios to identify biases in …
Listen