ID | Interpret | Skladba | Album | |
121. | Cole Swensen | UA Poetry Center | Conceptual Poetry and Its Others Symposium | |
122. | Hugh W. Nibley | How to Write an Anti-Mormon Book | Symposium on Joseph Smith | |
123. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
124. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
125. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
126. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
127. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
128. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
129. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
130. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
131. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
132. | Gaurav Shah | Keyboards and Covert Channels - Q&A | USENIX Security Symposium 2006 | |
133. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
134. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
135. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
136. | Gaurav Shah | Keyboards and Covert Channels | USENIX Security Symposium 2006 | |
137. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
138. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
139. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
140. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
141. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
142. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
143. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
144. | Benjamin Cox | N-Variant Systems: A Secretless Framework for Security through Diversity | USENIX Security Symposium 2006 | |
145. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
146. | Parisa Tabriz and Damon McCoy | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting | USENIX Security Symposium 2006 | |
147. | Parisa Tabriz and Damon McCoy | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting - Q&A | USENIX Security Symposium 2006 | |
148. | Larry Johnson | Symposium Closing | 2009 NMC Symposium on New Media & Learning | |
149. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages - Q&A | USENIX Security Symposium 2006 | |
150. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages | USENIX Security Symposium 2006 | |