ID | Interpret | Skladba | Album | |
121. | Dagfinn Føllesdal, Bruna de Marchi, Merle Jacob and Ian Hacking | Discussion | Holberg Prize Symposium 2009: Ian Hacking | |
122. | Humanitarian FOSS Project | Panel on "Open Source in the Curriculum" | Humanitarian FOSS Project Symposium 2009 | |
123. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
124. | Dagfinn Føllesdal, Bruna de Marchi, Merle Jacob and Ian Hacking | Discussion | Holberg Prize Symposium 2009: Ian Hacking | |
125. | Stephen Downes | Ruby, Blackboard, and the Challenge for Open Source | Free Software and Open Source Symposium | |
126. | Ian Hacking | Comments | Holberg Prize Symposium 2009: Ian Hacking | |
127. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
128. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
129. | Jose Nazario, Senior Security Engineer, Arbor Networks | Political DDoS: Estonia and Beyond | 17th USENIX Security Symposium Invited Talks | |
130. | Karsten Nohl and David Evans, University of Virginia; Starbug and Henryk Plötz, Chaos Computer Club, Berlin | Reverse-Engineering a Cryptographic RFID Tag | 17th USENIX Security Symposium Refereed Papers | |
131. | Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, and Haining Wang, The College of William and Mary | Measurement and Classification of Humans and Bots in Internet Chat | 17th USENIX Security Symposium Refereed Papers | |
132. | Negar Kiyavash, Amir Houmansadr, and Nikita Borisov, University of Illinois at Urbana-Champaign | Multi-flow Attacks Against Network Flow Watermarking Schemes | 17th USENIX Security Symposium Refereed Papers | |
133. | Charles Bernstein | introduction to | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
134. | Byung-Gon Chun, ICSI; Sylvia Ratnasamy, Intel Research Berkeley; Eddie Kohler, University of California, Los Angeles | NetComplex: A Complexity Metric for Networked System Designs | 5th USENIX Symposium on Networked Systems Design and Implementation | |
135. | Guofei Gu, Georgia Institute of Technology; Roberto Perdisci, Damballa, Inc.; Junjie Zhang and Wenke Lee, Georgia Institute of Technology | BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | 17th USENIX Security Symposium Refereed Papers | |
136. | Debra Bowen, California Secretary of State | Dr. Strangevote or: How I Learned to Stop Worrying and Love the Paper Ballot | 17th USENIX Security Symposium Invited Talks | |
137. | Sam Small, Joshua Mason, and Fabian Monrose, Johns Hopkins University; Niels Provos, Google Inc.; Adam Stubblefield, Johns Hopkins University | To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads | 17th USENIX Security Symposium Refereed Papers | |
138. | Xin Liu, Ang Li, and Xiaowei Yang, University of California, Irvine; David Wetherall, Intel Research Seattle and University of Washington | Passport: Secure and Adoptable Source Authentication | 5th USENIX Symposium on Networked Systems Design and Implementation | |
139. | Ben Adida, Harvard University | Helios: Web-based Open-Audit Voting | 17th USENIX Security Symposium Refereed Papers | |
140. | Dawson Engler, Stanford University; Ben Chelf, Andy Chou, and Seth Hallem, Coverity | A Few Billion Lines of Code Later: Experiences Commercializing a Static Checking Tool | 17th USENIX Security Symposium Invited Talks | |
141. | Jon Oberheide, Evan Cooke, and Farnam Jahanian, University of Michigan | CloudAV: N-Version Antivirus in the Network Cloud | 17th USENIX Security Symposium Refereed Papers | |
142. | Adam Barth, Collin Jackson, and John C. Mitchell, Stanford University | Securing Frame Communication in Browsers | 17th USENIX Security Symposium Refereed Papers | |
143. | Owen Harrison and John Waldron, Trinity College Dublin | Practical Symmetric Key Cryptography on Modern Graphics Hardware | 17th USENIX Security Symposium Refereed Papers | |
144. | Sebastian Zander, Swinburne University of Technology, Australia; Steven J. Murdoch, Computer Laboratory, University of Cambridge | An Improved Clock-skew Measurement Technique for Revealing Hidden Services | 17th USENIX Security Symposium Refereed Papers | |
145. | Charles Bernstein | Kiss Me Tommy | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
146. | Niels Provos, Google, Inc. | The Ghost in the Browser and Other Frightening Stories About Web Malware | 17th USENIX Security Symposium Invited Talks | |
147. | Jerry Chou and Bill Lin, University of California, San Diego; Subhabrata Sen and Oliver Spatscheck, AT&T Labs | Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks | 17th USENIX Security Symposium Refereed Papers | |
148. | Charles Bernstein | introduction to Dea%r Fr~ien%d | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
149. | Charles Bernstein and Tracie Morris | Truth Be Told, collaboration with Tracie Morris | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
150. | Thomas Ristenpart, University of California, San Diego; Gabriel Maganis, Arvind Krishnamurthy, and Tadayoshi Kohno, University of Washington | Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs | 17th USENIX Security Symposium Refereed Papers | |