Technical Papers
The SEI Digital Library houses thousands of technical papers and other documents, ranging from SEI Technical Reports on groundbreaking research to conference proceedings, survey results, and source code.
Filter by
-
Center for Calibrated Trust Measurement and Evaluation (CaTE)—Guidebook for the Development and TEVV of LAWS to Promote Trustworthiness
• White Paper
By Christopher Fairfax, Andrew O. Mellinger, Tyler Brooks, Daniel Justice
This guidebook supports personnel in the development and testing of autonomous weapon systems that employ ML, focusing on system reliability and operator trust.
DOWNLOAD -
Reference Architecture for Assuring Ethical Conduct in LAWS
• White Paper
By Emily Newman Tyler Brooks, Charles Loughin Andrew O. Mellinger, Eric Heim, Andrew Schellenberg
This reference architecture provides guidance to reason about designing and developing ML-enabled autonomous systems that have the capability to use lethal force.
DOWNLOAD -
Key Takeaways from Zero Trust Industry Day 2024
• White Paper
By Patsy Bulisco
This paper describes key takeaways from Zero Trust Industry Day 2024.
DOWNLOAD -
AI Hygiene Starts with Models and Data Loaders
• White Paper
By Renae Metcalf, Mahmoud Shabana, Matt Churilla, Shing-hon Lau
This paper places a call to action for traditional cybersecurity tools and techniques to be applied to artificial intelligence (AI) for improving the cybersecurity of AI systems.
DOWNLOAD -
Security Engineering Framework (SEF): Managing Security and Resilience Risks Across the Systems Lifecycle
• Special Report
By Carol Woody, Charles M. Wallen, Christopher J. Alberts, Tom Merendino, Michael S. Bandor
The SEF is a collection of software-focused engineering practices for managing security and resilience risks across the systems lifecycle.
DOWNLOAD -
Dangers of AI for Insider Risk Evaluation (DARE)
• White Paper
By Austin Whisnant
This paper describes the challenges and pitfalls of using artificial intelligence for insider risk analysis and how to thoughtfully and efficiently use AI to find insider threats.
DOWNLOAD -
Assurance Evidence of Continuously Evolving Real-Time Systems (ASERT) Workshop 2024
• Special Report
By George Romanski (Federal Aviation Administration), Hyoseung Kim (University of California, Riverside), Mark H. Klein, Floyd Fazi (Lockheed Martin Corporation), Daniel Shapiro (Institute of Defense Analysis), Jonathan Preston (Lockheed Martin Corporation), John Lehoczky (Carnegie Mellon University), Bjorn Andersson, Dionisio de Niz, Ronald Koontz (Boeing Company)
This report summarizes the analysis of the Taiwanese flight CI202 incident from 2020 as well as ideas for future work for ASERT presented at its 2024 workshop.
DOWNLOAD -
Self-Assessment in Training and Exercise
• Technical Report
By Dustin D. Updyke, Thomas G. Podnar, Sean Huff, John Yarger
In this report, the authors introduce an approach to performance evaluation that focuses on self-assessment.
DOWNLOAD -
Counter AI: What Is It and What Can You Do About It?
• White Paper
By Shing-hon Lau, Lauren McIlvenny, Greg Touhill, Matt Churilla, Carol J. Smith, Nathan M. VanHoudnos
This paper describes counter artificial intelligence (AI) and provides recommendations on what can be done about it.
DOWNLOAD -
Terrain in Cyberspace Operations—Terminology
• White Paper
By Vincent LaPiana, Nathaniel Richmond
This paper defines several terms used to describe cyber operations and how they relate to other terms important to military operations and mission planning.
DOWNLOAD