ID | Interpret | Skladba | Album | |
31. | Westside Connection | So Many Rappers In Love | Terrorist Threats | |
32. | Westside Connection | Bangin' At The Party | Terrorist Threats | |
33. | Westside Connection | You Gotta Have Heart | Terrorist Threats | |
34. | Westside Connection | Superstar | Terrorist Threats | |
35. | Westside Connection | Don't Get Outta Pocket | Terrorist Threats | |
36. | Panic Bomber | - | Calling in More Threats | |
37. | Westside Connection | Izm | Terrorist Threats | |
38. | The One AM Radio | Credible Threats | Credible Threats | |
39. | Abhinav Pathak and Y. Charlie Hu, Purdue University; Z. Morley Mao, University of Michigan | Peeking into Spammer Behavior from a Unique Vantage Point | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
40. | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, University of California, San Diego | The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
41. | D. Kevin McGrath and Minaxi Gupta, Indiana University, Bloomington | Behind Phishing: An Examination of Phisher Modi Operandi | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
42. | Aaron J. Burstein, University of California, Berkeley, School of Law | Conducting Cybersecurity Research Legally and Ethically | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
43. | D. Kevin McGrath and Minaxi Gupta, Indiana University, Bloomington | Behind Phishing: An Examination of Phisher Modi Operandi | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
44. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
45. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
46. | Aaron J. Burstein, University of California, Berkeley, School of Law | Conducting Cybersecurity Research Legally and Ethically | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
47. | Abhinav Pathak and Y. Charlie Hu, Purdue University; Z. Morley Mao, University of Michigan | Peeking into Spammer Behavior from a Unique Vantage Point | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
48. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
49. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
50. | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, University of California, San Diego | The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
51. | Don Francisco | The Promises Grace | The Promises | |
52. | Don Francisco | The Promises Deliverance | The Promises | |
53. | Don Francisco | The Promises The Word | The Promises | |
54. | Don Francisco | The Promises Encouragement | The Promises | |
55. | Don Francisco | The Promises Faith | The Promises | |
56. | Don Francisco | The Promises Health | The Promises | |
57. | Wild Geese | Promises to keep | Promises To Keep | |
58. | Don Francisco | The Promises Prosperity | The Promises | |
59. | Carla Bruni | Autumn | No Promises | |
60. | Die! Die! Die! | People Talk | Promises Promises | |