ID | Interpret | Skladba | Album | |
91. | David Wagner | The State of Electronic Voting, 2008 | 22nd Large Installation System Administration Conference | |
92. | Dan Langille | Fighting Spam with pf | 22nd Large Installation System Administration Conference | |
93. | James Hughes | OpenSolaris and the Direction of Future Operating Systems | 22nd Large Installation System Administration Conference | |
94. | James Hughes | OpenSolaris and the Direction of Future Operating Systems | 22nd Large Installation System Administration Conference | |
95. | Monica Lam | Beyond VDI: Why Thin Client Computing and Virtual Desktop Infrastructures Aren't Cutting It | 22nd Large Installation System Administration Conference | |
96. | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, University of California, San Diego | The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
97. | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, University of California, San Diego | The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
98. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
99. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
100. | Abhinav Pathak and Y. Charlie Hu, Purdue University; Z. Morley Mao, University of Michigan | Peeking into Spammer Behavior from a Unique Vantage Point | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
101. | Aaron J. Burstein, University of California, Berkeley, School of Law | Conducting Cybersecurity Research Legally and Ethically | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
102. | Aaron J. Burstein, University of California, Berkeley, School of Law | Conducting Cybersecurity Research Legally and Ethically | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
103. | Abhinav Pathak and Y. Charlie Hu, Purdue University; Z. Morley Mao, University of Michigan | Peeking into Spammer Behavior from a Unique Vantage Point | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
104. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
105. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
106. | D. Kevin McGrath and Minaxi Gupta, Indiana University, Bloomington | Behind Phishing: An Examination of Phisher Modi Operandi | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
107. | D. Kevin McGrath and Minaxi Gupta, Indiana University, Bloomington | Behind Phishing: An Examination of Phisher Modi Operandi | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
108. | Gautam Singaraju | RepuScore: Collaborative Reputation Management Framework for Email Infrastructure | 21st Large Installation System Administration Conference Refereed Papers | |
109. | Gautam Singaraju | RepuScore: Collaborative Reputation Management Framework for Email Infrastructure | 21st Large Installation System Administration Conference Refereed Papers | |
110. | Jeannie Albrecht | Remote Control: Distributed Application Configuration, Management, & Visualization with Plush | 21st Large Installation System Administration Conference Refereed Papers | |
111. | Jeannie Albrecht | Remote Control: Distributed Application Configuration, Management, & Visualization with Plush | 21st Large Installation System Administration Conference Refereed Papers | |
112. | Guido Trotter | Ganeti: An Open Source Multi-Node HA Cluster Based on Xen | 21st Large Installation System Administration Conference Invited Talks | |
113. | Guido Trotter | Ganeti: An Open Source Multi-Node HA Cluster Based on Xen | 21st Large Installation System Administration Conference Invited Talks | |
114. | Alva L. Couch | Should the Root Prompt Require a Road Test? | 21st Large Installation System Administration Conference Invited Talks | |
115. | Hai Huang | PDA: A Tool for Automated Problem Determination | 21st Large Installation System Administration Conference Refereed Papers | |
116. | Alva L. Couch | Should the Root Prompt Require a Road Test? | 21st Large Installation System Administration Conference Invited Talks | |
117. | Alok Tongaonkar | Inferring Higher Level Policies from Firewall Rules | 21st Large Installation System Administration Conference Refereed Papers | |
118. | Cat Okita | The Security Butterfly Effect | 21st Large Installation System Administration Conference Invited Talks | |
119. | Alok Tongaonkar | Inferring Higher Level Policies from Firewall Rules | 21st Large Installation System Administration Conference Refereed Papers | |
120. | Alexander Muentz | Hardening Your Systems Against Litigation | 21st Large Installation System Administration Conference Invited Talks | |