ID | Interpret | Skladba | Album | |
121. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
122. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
123. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
124. | KyoungSoo Park, Vivek S. Pai | Securing Web Service by Automatic Robot Detection | USENIX '06 Annual Technical Conferecne | |
125. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
126. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
127. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages - Q&A | USENIX Security Symposium 2006 | |
128. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages | USENIX Security Symposium 2006 | |
129. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
130. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
131. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
132. | Atul Adya, Erich Nahum, Clem Cole, John Maddog Hall | Introduction and Awards | USENIX '06 Annual Technical Conference | |
133. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
134. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
135. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
136. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
137. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
138. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
139. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
140. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
141. | Parisa Tabriz and Damon McCoy | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting - Q&A | USENIX Security Symposium 2006 | |
142. | Parisa Tabriz and Damon McCoy | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting | USENIX Security Symposium 2006 | |
143. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
144. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
145. | Gaurav Shah | Keyboards and Covert Channels - Q&A | USENIX Security Symposium 2006 | |
146. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
147. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
148. | Gaurav Shah | Keyboards and Covert Channels | USENIX Security Symposium 2006 | |
149. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
150. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |