ID | Interpret | Skladba | Album | |
31. | David N. Blank-Edelman | Cookin' at the Keyboard | 21st Large Installation System Administration Conference Invited Talks | |
32. | Ken Simpson | Using Throttling and Traffic Shaping to Combat Botnet Spam | 21st Large Installation System Administration Conference Invited Talks | |
33. | Guido Trotter | Ganeti: An Open Source Multi-Node HA Cluster Based on Xen | 21st Large Installation System Administration Conference Invited Talks | |
34. | Erik Nygren | Experiences with Scalable Network Operations at Akamai | 21st Large Installation System Administration Conference Invited Talks | |
35. | Guido Trotter | Ganeti: An Open Source Multi-Node HA Cluster Based on Xen | 21st Large Installation System Administration Conference Invited Talks | |
36. | Guido Trotter | Ganeti: An Open Source Multi-Node HA Cluster Based on Xen | 21st Large Installation System Administration Conference Invited Talks | |
37. | David Josephsen | Homeless Vikings: BGP Prefix Hijacking and the Spam Wars | 21st Large Installation System Administration Conference Invited Talks | |
38. | Bruce Moxon | A Service-Oriented Data Grid: Beyond Storage Virtualization | 21st Large Installation System Administration Conference Invited Talks | |
39. | Tony Cass | The LHC Computing Challenge | 21st Large Installation System Administration Conference Invited Talks | |
40. | Carson Gaspar | Deploying Nagios in a Large Enterprise Environment | 21st Large Installation System Administration Conference Invited Talks | |
41. | Carson Gaspar | Deploying Nagios in a Large Enterprise Environment | 21st Large Installation System Administration Conference Invited Talks | |
42. | Alexander Muentz | Hardening Your Systems Against Litigation | 21st Large Installation System Administration Conference Invited Talks | |
43. | Cat Okita | The Security Butterfly Effect | 21st Large Installation System Administration Conference Invited Talks | |
44. | James Hughes | OpenSolaris and the Direction of Future Operating Systems | 22nd Large Installation System Administration Conference | |
45. | Sean Kamath | Inside DreamWorks Animation Studios: A Look at Past, Present, and Future Challenges | 22nd Large Installation System Administration Conference | |
46. | James Hughes | OpenSolaris and the Direction of Future Operating Systems | 22nd Large Installation System Administration Conference | |
47. | David Wagner | The State of Electronic Voting, 2008 | 22nd Large Installation System Administration Conference | |
48. | Sean Kamath | Inside DreamWorks Animation Studios: A Look at Past, Present, and Future Challenges | 22nd Large Installation System Administration Conference | |
49. | Monica Lam | Beyond VDI: Why Thin Client Computing and Virtual Desktop Infrastructures Aren't Cutting It | 22nd Large Installation System Administration Conference | |
50. | Dan Langille | Fighting Spam with pf | 22nd Large Installation System Administration Conference | |
51. | Adam Barth, Collin Jackson, and John C. Mitchell, Stanford University | Securing Frame Communication in Browsers | 17th USENIX Security Symposium Refereed Papers | |
52. | Karsten Nohl and David Evans, University of Virginia; Starbug and Henryk Plötz, Chaos Computer Club, Berlin | Reverse-Engineering a Cryptographic RFID Tag | 17th USENIX Security Symposium Refereed Papers | |
53. | J. Alex Halderman, Princeton University; Seth D. Schoen, Electronic Frontier Foundation; Nadia Heninger and William Clarkson, Princeton University; William Paul, Wind River Systems; Joseph A. Calandri | Lest We Remember: Cold Boot Attacks on Encryption Keys | 17th USENIX Security Symposium Refereed Papers | |
54. | Guofei Gu, Georgia Institute of Technology; Roberto Perdisci, Damballa, Inc.; Junjie Zhang and Wenke Lee, Georgia Institute of Technology | BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | 17th USENIX Security Symposium Refereed Papers | |
55. | Sam Small, Joshua Mason, and Fabian Monrose, Johns Hopkins University; Niels Provos, Google Inc.; Adam Stubblefield, Johns Hopkins University | To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads | 17th USENIX Security Symposium Refereed Papers | |
56. | Lucas Ballard and Seny Kamara, The Johns Hopkins University; Michael K. Reiter, University of North Carolina at Chapel Hill | The Practical Subtleties of Biometric Key Generation | 17th USENIX Security Symposium Refereed Papers | |
57. | Sebastian Zander, Swinburne University of Technology, Australia; Steven J. Murdoch, Computer Laboratory, University of Cambridge | An Improved Clock-skew Measurement Technique for Revealing Hidden Services | 17th USENIX Security Symposium Refereed Papers | |
58. | Ari Juels, RSA Laboratories; Ravikanth Pappu, ThingMagic Inc; Bryan Parno, Carnegie Mellon University | Unidirectional Key Distribution Across Time and Space with Applications to RFID Security | 17th USENIX Security Symposium Refereed Papers | |
59. | Ben Adida, Harvard University | Helios: Web-based Open-Audit Voting | 17th USENIX Security Symposium Refereed Papers | |
60. | Michael Dalton, Hari Kannan, and Christos Kozyrakis, Stanford University | Real-World Buffer Overflow Protection for User and Kernel Space | 17th USENIX Security Symposium Refereed Papers | |