icon-carat-right
menu
search
cmu-wordmark
Carnegie Mellon University
Software Engineering Institute
Home
Publications
Authors
Chad Dougherty
Chad Dougherty
All
Tech Publications
Blog Posts
Podcasts
Blog Reorganization
February 11, 2011
•
Blog Post
By
Chad Dougherty
Study of Malicious Domain Names: TLD Distribution
August 31, 2010
•
Blog Post
By
Chad Dougherty
Protect Your Business from Money Mules
April 27, 2010
•
Podcast
By
Chad Dougherty
,
Julia H. Allen
Top-10 Top Level and Second Level Domains Found in Malicious Software
March 5, 2010
•
Blog Post
By
Chad Dougherty
Secure Design Patterns
October 1, 2009
•
Technical Report
By
Chad Dougherty
,
Kirk Sayre
,
Robert C. Seacord
,
David Svoboda
,
Kazuya Togashi (JPCERT/CC)
More from Chad Dougherty
Secure Design Patterns
October 1, 2009
•
Technical Report
By
Chad Dougherty
,
Kirk Sayre
,
Robert C. Seacord
,
David Svoboda
,
Kazuya Togashi (JPCERT/CC)
Evaluation of CERT Secure Coding Rules through Integration with Source Code Analysis Tools
June 1, 2008
•
Technical Report
By
Stephen Dewhurst
,
Chad Dougherty
,
Yurie Ito
,
David Keaton
,
Dan Saks
,
Robert C. Seacord
,
David Svoboda
,
Chris Taschner
,
Kazuya Togashi (JPCERT/CC)
More from Chad Dougherty
Blog Reorganization
February 11, 2011
•
Blog Post
By
Chad Dougherty
Study of Malicious Domain Names: TLD Distribution
August 31, 2010
•
Blog Post
By
Chad Dougherty
Top-10 Top Level and Second Level Domains Found in Malicious Software
March 5, 2010
•
Blog Post
By
Chad Dougherty
Recommendations to Vendors for Communicating Product Security Information
November 20, 2008
•
Blog Post
By
Chad Dougherty
More from Chad Dougherty
Protect Your Business from Money Mules
April 27, 2010
•
Podcast
By
Chad Dougherty
,
Julia H. Allen
More from Chad Dougherty