search
menu
icon-carat-right
cmu-wordmark
✕
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
Enterprise Risk and Resilience Management
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webinar Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity and Inclusion
Internship Opportunities
Working at the SEI
Carnegie Mellon University
Software Engineering Institute
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cloud Computing
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webcasts Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity, and Inclusion
Internship Opportunities
Home
Publications
Authors
Leigh B. Metcalf
Leigh Metcalf
Software Engineering Institute
All
Tech Publications
Blog Posts
Podcasts
Applying Scientific Methods in Cybersecurity
August 26, 2021
•
Podcast
By
Leigh B. Metcalf
,
Jonathan Spring
Vulnerabilities: Everybody’s Got One!
June 16, 2021
• By
Leigh B. Metcalf
Using Science in Cybersecurity
May 1, 2021
•
Book
By
Leigh B. Metcalf
,
Jonathan Spring
Bridging the Gap Between Research and Practice
March 23, 2020
• By
Leigh B. Metcalf
Machine Learning in Cybersecurity: A Guide
September 5, 2019
•
Technical Report
By
Jonathan Spring
,
Joshua Fallon
,
April Galyardt
,
Angela Horneman
,
Leigh B. Metcalf
,
Ed Stoner
More from Leigh Metcalf
Machine Learning in Cybersecurity: A Guide
September 5, 2019
•
Technical Report
By
Jonathan Spring
,
Joshua Fallon
,
April Galyardt
,
Angela Horneman
,
Leigh B. Metcalf
,
Ed Stoner
Blacklist Ecosystem Analysis: July - December 2017
April 19, 2018
•
White Paper
By
Eric Hatleback
,
Leigh B. Metcalf
Blacklist Ecosystem Analysis: January - June, 2017
August 22, 2017
•
White Paper
By
Eric Hatleback
,
Leigh B. Metcalf
Blacklist Ecosystem Analysis: July – December 2016
June 1, 2017
•
White Paper
By
Eric Hatleback
,
Leigh B. Metcalf
Blacklist Ecosystem Analysis: January – June, 2016
December 1, 2016
•
White Paper
By
Leigh B. Metcalf
,
Eric Hatleback
More from Leigh Metcalf
Vulnerabilities: Everybody’s Got One!
June 16, 2021
• By
Leigh B. Metcalf
Bridging the Gap Between Research and Practice
March 23, 2020
• By
Leigh B. Metcalf
Vulnonym: Stop the Naming Madness!
August 23, 2019
• By
Leigh B. Metcalf
DGA Domains with SSL Certificates? Why?
December 5, 2018
• By
Leigh B. Metcalf
Cache Poisoning of Mail Handling Domains Revisited
June 20, 2018
• By
Leigh B. Metcalf
More from Leigh Metcalf
Applying Scientific Methods in Cybersecurity
August 26, 2021
•
Podcast
By
Leigh B. Metcalf
,
Jonathan Spring
More from Leigh Metcalf
Send a Message