search
menu
icon-carat-right
cmu-wordmark
✕
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
Enterprise Risk and Resilience Management
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webinar Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity and Inclusion
Internship Opportunities
Working at the SEI
Carnegie Mellon University
Software Engineering Institute
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cloud Computing
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webcasts Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity, and Inclusion
Internship Opportunities
Home
Publications
Authors
Chad Dougherty
Chad Dougherty
All
Tech Publications
Blog Posts
Podcasts
Blog Reorganization
February 11, 2011
•
Blog Post
By
Chad Dougherty
Study of Malicious Domain Names: TLD Distribution
August 31, 2010
•
Blog Post
By
Chad Dougherty
Protect Your Business from Money Mules
April 27, 2010
•
Podcast
By
Chad Dougherty
,
Julia H. Allen
Top-10 Top Level and Second Level Domains Found in Malicious Software
March 5, 2010
•
Blog Post
By
Chad Dougherty
Secure Design Patterns
October 1, 2009
•
Technical Report
By
Chad Dougherty
,
Kirk Sayre
,
Robert C. Seacord
,
David Svoboda
,
Kazuya Togashi (JPCERT/CC)
More from Chad Dougherty
Secure Design Patterns
October 1, 2009
•
Technical Report
By
Chad Dougherty
,
Kirk Sayre
,
Robert C. Seacord
,
David Svoboda
,
Kazuya Togashi (JPCERT/CC)
Evaluation of CERT Secure Coding Rules through Integration with Source Code Analysis Tools
June 1, 2008
•
Technical Report
By
Stephen Dewhurst
,
Chad Dougherty
,
Yurie Ito
,
David Keaton
,
Dan Saks
,
Robert C. Seacord
,
David Svoboda
,
Chris Taschner
,
Kazuya Togashi (JPCERT/CC)
More from Chad Dougherty
Blog Reorganization
February 11, 2011
•
Blog Post
By
Chad Dougherty
Study of Malicious Domain Names: TLD Distribution
August 31, 2010
•
Blog Post
By
Chad Dougherty
Top-10 Top Level and Second Level Domains Found in Malicious Software
March 5, 2010
•
Blog Post
By
Chad Dougherty
Recommendations to Vendors for Communicating Product Security Information
November 20, 2008
•
Blog Post
By
Chad Dougherty
More from Chad Dougherty
Protect Your Business from Money Mules
April 27, 2010
•
Podcast
By
Chad Dougherty
,
Julia H. Allen
More from Chad Dougherty