icon-carat-right
menu
search
cmu-wordmark
Carnegie Mellon University
Software Engineering Institute
Home
Publications
Authors
Leigh B. Metcalf
Leigh B. Metcalf
Software Engineering Institute
All
Tech Publications
Blog Posts
Podcasts
Videos
Malware Research: If You Cannot Replicate it, You Will Not Use It
April 23, 2025
•
Webcast
By
Leigh B. Metcalf
,
Edward J. Schwartz
The Threat of Deprecated BGP Attributes
June 3, 2024
•
Blog Post
By
Leigh B. Metcalf
,
Timur D. Snoke
Applying Scientific Methods in Cybersecurity
August 26, 2021
•
Podcast
By
Leigh B. Metcalf
,
Jonathan Spring
Vulnerabilities: Everybody’s Got One!
June 16, 2021
•
Blog Post
By
Leigh B. Metcalf
Using Science in Cybersecurity
May 1, 2021
•
Book
By
Leigh B. Metcalf
,
Jonathan Spring
More from Leigh Metcalf
Machine Learning in Cybersecurity: A Guide
September 5, 2019
•
Technical Report
By
Jonathan Spring
,
Joshua Fallon
,
April Galyardt
,
Angela Horneman
,
Leigh B. Metcalf
,
Ed Stoner
Blacklist Ecosystem Analysis: July - December 2017
April 19, 2018
•
White Paper
By
Eric Hatleback
,
Leigh B. Metcalf
Blacklist Ecosystem Analysis: January - June, 2017
August 22, 2017
•
White Paper
By
Eric Hatleback
,
Leigh B. Metcalf
Blacklist Ecosystem Analysis: July – December 2016
June 1, 2017
•
White Paper
By
Eric Hatleback
,
Leigh B. Metcalf
Blacklist Ecosystem Analysis: January – June, 2016
December 1, 2016
•
White Paper
By
Leigh B. Metcalf
,
Eric Hatleback
More from Leigh Metcalf
The Threat of Deprecated BGP Attributes
June 3, 2024
•
Blog Post
By
Leigh B. Metcalf
,
Timur D. Snoke
Vulnerabilities: Everybody’s Got One!
June 16, 2021
•
Blog Post
By
Leigh B. Metcalf
Bridging the Gap Between Research and Practice
March 23, 2020
•
Blog Post
By
Leigh B. Metcalf
Vulnonym: Stop the Naming Madness!
August 23, 2019
•
Blog Post
By
Leigh B. Metcalf
DGA Domains with SSL Certificates? Why?
December 5, 2018
•
Blog Post
By
Leigh B. Metcalf
More from Leigh Metcalf
Applying Scientific Methods in Cybersecurity
August 26, 2021
•
Podcast
By
Leigh B. Metcalf
,
Jonathan Spring
More from Leigh Metcalf
Malware Research: If You Cannot Replicate it, You Will Not Use It
April 23, 2025
•
Webcast
By
Leigh B. Metcalf
,
Edward J. Schwartz
More from Leigh Metcalf
Send a Message