Vše Interpret Skladba Album
mp3seznam.cz - Žádný ze zde umístěných souborů se nenachází na tomto serveru. Proto nezodpovídáme za jejich kvalitu ani za porušování autorských práv - tuto zodpovědnost nese server na který odkazujeme.
IDInterpretSkladbaAlbum
 121. Gang Tan and Jason Croft, Boston College An Empirical Security Study of the Native Code in the JDK  17th USENIX Security Symposium Refereed Papers  
 122. Daniel Sandler, Kyle Derr, and Dan S. Wallach, Rice University VoteBox: A Tamper-evident, Verifiable Electronic Voting System  17th USENIX Security Symposium Refereed Papers  
 123. Rui Wang and XiaoFeng Wang, Indiana University at Bloomington; Zhuowei Li, Center for Software Excellence, Microsoft Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software  17th USENIX Security Symposium Refereed Papers  
 124. Jerry Chou and Bill Lin, University of California, San Diego; Subhabrata Sen and Oliver Spatscheck, AT&T Labs Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks  17th USENIX Security Symposium Refereed Papers  
 125. Jon Oberheide, Evan Cooke, and Farnam Jahanian, University of Michigan CloudAV: N-Version Antivirus in the Network Cloud  17th USENIX Security Symposium Refereed Papers  
 126. Darren Lacey, Chief Information Security Officer, Johns Hopkins University/Johns Hopkins Medicine Managing Insecurity: Practitioner Reflections on Social Costs of Security  17th USENIX Security Symposium Invited Talks  
 127. Ben Adida, Harvard University Helios: Web-based Open-Audit Voting  17th USENIX Security Symposium Refereed Papers  
 128. Debra Bowen, California Secretary of State Dr. Strangevote or: How I Learned to Stop Worrying and Love the Paper Ballot  17th USENIX Security Symposium Invited Talks  
 129. Michael Dalton, Hari Kannan, and Christos Kozyrakis, Stanford University Real-World Buffer Overflow Protection for User and Kernel Space  17th USENIX Security Symposium Refereed Papers  
 130. Jose Nazario, Senior Security Engineer, Arbor Networks Political DDoS: Estonia and Beyond  17th USENIX Security Symposium Invited Talks  
 131. Lucas Ballard and Seny Kamara, The Johns Hopkins University; Michael K. Reiter, University of North Carolina at Chapel Hill The Practical Subtleties of Biometric Key Generation  17th USENIX Security Symposium Refereed Papers  
 132. Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, and Haining Wang, The College of William and Mary Measurement and Classification of Humans and Bots in Internet Chat  17th USENIX Security Symposium Refereed Papers  
 133. Swaminathan Sundararaman, Gopalan Sivathanu, and Erez Zadok, Stony Brook University Selective Versioning in a Secure Disk System  17th USENIX Security Symposium Refereed Papers  
 134. Negar Kiyavash, Amir Houmansadr, and Nikita Borisov, University of Illinois at Urbana-Champaign Multi-flow Attacks Against Network Flow Watermarking Schemes  17th USENIX Security Symposium Refereed Papers  
 135. Sebastian Zander, Swinburne University of Technology, Australia; Steven J. Murdoch, Computer Laboratory, University of Cambridge An Improved Clock-skew Measurement Technique for Revealing Hidden Services  17th USENIX Security Symposium Refereed Papers  
 136. Sam Small, Joshua Mason, and Fabian Monrose, Johns Hopkins University; Niels Provos, Google Inc.; Adam Stubblefield, Johns Hopkins University To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads  17th USENIX Security Symposium Refereed Papers  
 137. Byung-Gon Chun, ICSI; Sylvia Ratnasamy, Intel Research Berkeley; Eddie Kohler, University of California, Los Angeles NetComplex: A Complexity Metric for Networked System Designs  5th USENIX Symposium on Networked Systems Design and Implementation  
 138. Guofei Gu, Georgia Institute of Technology; Roberto Perdisci, Damballa, Inc.; Junjie Zhang and Wenke Lee, Georgia Institute of Technology BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection  17th USENIX Security Symposium Refereed Papers  
 139. Adam Barth, Collin Jackson, and John C. Mitchell, Stanford University Securing Frame Communication in Browsers  17th USENIX Security Symposium Refereed Papers  
 140. Xin Liu, Ang Li, and Xiaowei Yang, University of California, Irvine; David Wetherall, Intel Research Seattle and University of Washington Passport: Secure and Adoptable Source Authentication  5th USENIX Symposium on Networked Systems Design and Implementation  
 141. Ari Juels, RSA Laboratories; Ravikanth Pappu, ThingMagic Inc; Bryan Parno, Carnegie Mellon University Unidirectional Key Distribution Across Time and Space with Applications to RFID Security  17th USENIX Security Symposium Refereed Papers  
 142. J. Alex Halderman, Princeton University; Seth D. Schoen, Electronic Frontier Foundation; Nadia Heninger and William Clarkson, Princeton University; William Paul, Wind River Systems; Joseph A. Calandri Lest We Remember: Cold Boot Attacks on Encryption Keys  17th USENIX Security Symposium Refereed Papers  
 143. Thomas Ristenpart, University of California, San Diego; Gabriel Maganis, Arvind Krishnamurthy, and Tadayoshi Kohno, University of Washington Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs  17th USENIX Security Symposium Refereed Papers  
 144. Michael Martin and Monica S. Lam, Stanford University Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking  17th USENIX Security Symposium Refereed Papers  
 145. Niels Provos, Google, Inc. The Ghost in the Browser and Other Frightening Stories About Web Malware  17th USENIX Security Symposium Invited Talks  
 146. Dawson Engler, Stanford University; Ben Chelf, Andy Chou, and Seth Hallem, Coverity A Few Billion Lines of Code Later: Experiences Commercializing a Static Checking Tool  17th USENIX Security Symposium Invited Talks  
 147. Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware  First USENIX Workshop on Large-Scale Exploits and Emergent Threats  
 148. Abhinav Pathak and Y. Charlie Hu, Purdue University; Z. Morley Mao, University of Michigan Peeking into Spammer Behavior from a Unique Vantage Point  First USENIX Workshop on Large-Scale Exploits and Emergent Threats  
 149. Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, University of California, San Diego The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff  First USENIX Workshop on Large-Scale Exploits and Emergent Threats  
 150. D. Kevin McGrath and Minaxi Gupta, Indiana University, Bloomington Behind Phishing: An Examination of Phisher Modi Operandi  First USENIX Workshop on Large-Scale Exploits and Emergent Threats  
  «    1 2 3 4 5 6 7    »
Gamesníci.cz - Superhry
Přehled nejstahovanějších MP3 za uplynulý den
16.  Wohnout - Pedro se vracístaženo: 1x
17.  Yello - Jingle Bellsstaženo: 1x
18.  Depeche Mode - I Want It Allstaženo: 1x
19.  Alkehol - Hlupák váhástaženo: 1x
20.  Jaromír Nohavica - Chtěl bych zažítstaženo: 1x
21.  Horkýže Slíže - Mao C Tungstaženo: 1x
22.  Daniel Landa - Malá díra v hlavěstaženo: 1x
23.  Rytmus - Zlatokopkystaženo: 1x
24.  Kristina - Horehroniestaženo: 1x
25.  DeTee - Fanfárystaženo: 1x
26.  Tleskač - Zelená Je Trávastaženo: 1x
27.  Queen - We Are the Championsstaženo: 1x
28.  Jaromír Nohavica - Směsstaženo: 1x
29.  Milo - Pro Eliškustaženo: 1x
30.  Depeche Mode - Pipelinestaženo: 1x