ID | Interpret | Skladba | Album | |
1. | Guofei Gu, Georgia Institute of Technology; Roberto Perdisci, Damballa, Inc.; Junjie Zhang and Wenke Lee, Georgia Institute of Technology | BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | 17th USENIX Security Symposium Refereed Papers | |
2. | MU News Bureau | 12.16.05 Traffic Detection | Spotlight on Science | |
3. | Ken Simpson | Using Throttling and Traffic Shaping to Combat Botnet Spam | 21st Large Installation System Administration Conference Invited Talks | |
4. | Ken Simpson | Using Throttling and Traffic Shaping to Combat Botnet Spam | 21st Large Installation System Administration Conference Invited Talks | |
5. | Ken Simpson | Using Throttling and Traffic Shaping to Combat Botnet Spam | 21st Large Installation System Administration Conference Invited Talks | |
6. | George | Traffic Analysis of Encrypted Web Traffic | | |
7. | George | Traffic Analysis of Encrypted Web Traffic | | |
8. | SearchSecurity.com and Addison Wesley | Extrusion Detection: Defensible Network Architecture | | |
9. | Damiano Bolzoni | ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Sytems | 21st Large Installation System Administration Conference Refereed Papers | |
10. | Damiano Bolzoni | ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Sytems | 21st Large Installation System Administration Conference Refereed Papers | |
11. | Ralph Hass | Independent Comedy Network Ima | Voice123 | |
12. | Cisco Systems | Cisco Network Analysis Module | Cisco Network Management Podcast Series | |
13. | Andrew W. Leung, University of California, Santa Cruz; Shankar Pasupathy and Garth Goodson, NetApp Inc.; Ethan L. Miller, University of California, Santa Cruz | Measurement and Analysis of Large-Scale Network File System Workloads | 2008 USENIX Annual Technical Conference | |
14. | Rocky Mountain Voices | Solera Networks: How to Tivo Your Network Traffic | Rocky Mountain Voices -- Powered by PodTech | |
15. | Rocky Mountain Voices | Solera Networks: How to Tivo Your Network Traffic | Rocky Mountain Voices -- Powered by PodTech | |
16. | Todd | TechNet Webcast: How Microsoft IT Optimizes Network Traffic with the Next-Generation TCP/IP Stack | | |
17. | Host Mike Glennon and Guest Carl Claunch | What is Clustering & When to Use It | Gartner Voice | |
18. | Wayne Sharer | The Great Traffic Experiment - Recap of How to Use Twitter to Increase Targeted Website Traffic | | |
19. | Wayne Sharer | Traffic Experiment - The Birth of Your Targeted Website Traffic Blog | The Great Traffic Experiment | |
20. | Sheila E and E Train | Protocol | | |
21. | Sheila E and E Train | Protocol | | |
22. | Alphonse Mouzon | Protocol | The Night Is Still Young | |
23. | Alphonse Mouzon | Protocol | The Night Is Still Young | |
24. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
25. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
26. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
27. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
28. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
29. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
30. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |