icon-carat-right
menu
search
cmu-wordmark
Carnegie Mellon University
Software Engineering Institute
Home
Publications
Authors
Leigh B. Metcalf
Leigh B. Metcalf
Software Engineering Institute
All
Tech Publications
Blog Posts
Podcasts
The Threat of Deprecated BGP Attributes
June 3, 2024
•
Blog Post
By
Leigh B. Metcalf
,
Timur D. Snoke
Applying Scientific Methods in Cybersecurity
August 26, 2021
•
Podcast
By
Leigh B. Metcalf
,
Jonathan Spring
Vulnerabilities: Everybody’s Got One!
June 16, 2021
•
Blog Post
By
Leigh B. Metcalf
Using Science in Cybersecurity
May 1, 2021
•
Book
By
Leigh B. Metcalf
,
Jonathan Spring
Bridging the Gap Between Research and Practice
March 23, 2020
•
Blog Post
By
Leigh B. Metcalf
More from Leigh Metcalf
Machine Learning in Cybersecurity: A Guide
September 5, 2019
•
Technical Report
By
Jonathan Spring
,
Joshua Fallon
,
April Galyardt
,
Angela Horneman
,
Leigh B. Metcalf
,
Ed Stoner
Blacklist Ecosystem Analysis: July - December 2017
April 19, 2018
•
White Paper
By
Eric Hatleback
,
Leigh B. Metcalf
Blacklist Ecosystem Analysis: January - June, 2017
August 22, 2017
•
White Paper
By
Eric Hatleback
,
Leigh B. Metcalf
Blacklist Ecosystem Analysis: July – December 2016
June 1, 2017
•
White Paper
By
Eric Hatleback
,
Leigh B. Metcalf
Blacklist Ecosystem Analysis: January – June, 2016
December 1, 2016
•
White Paper
By
Leigh B. Metcalf
,
Eric Hatleback
More from Leigh Metcalf
The Threat of Deprecated BGP Attributes
June 3, 2024
•
Blog Post
By
Leigh B. Metcalf
,
Timur D. Snoke
Vulnerabilities: Everybody’s Got One!
June 16, 2021
•
Blog Post
By
Leigh B. Metcalf
Bridging the Gap Between Research and Practice
March 23, 2020
•
Blog Post
By
Leigh B. Metcalf
Vulnonym: Stop the Naming Madness!
August 23, 2019
•
Blog Post
By
Leigh B. Metcalf
DGA Domains with SSL Certificates? Why?
December 5, 2018
•
Blog Post
By
Leigh B. Metcalf
More from Leigh Metcalf
Applying Scientific Methods in Cybersecurity
August 26, 2021
•
Podcast
By
Leigh B. Metcalf
,
Jonathan Spring
More from Leigh Metcalf
Send a Message