ID | Interpret | Skladba | Album | |
181. | Fragma | Toca`S Miricle | Kevin & Perry 'go Large' (Cd2) | |
182. | Storm Large & Rick Emerson | Radio Interview | Storm Large & Rick Emerson | |
183. | CBC Radio: Words at Large | wordsatlarge 2007-11-21 | Words At Large podcast 83- GG Talent | |
184. | Zengineers | 30 minutes | Mental maps for large territories | |
185. | Zengineers | The legacy | Mental maps for large territories | |
186. | CBC Radio: Words at Large | wordsatlarge 2007-11-14 | Words At Large podcast 82- GG Non-Fiction | |
187. | Hunters & Collectors | Throw Your Arms Around Me | Living In Large Rooms and Lounges | |
188. | Lyle Lovett | Stand By Your Man | Lyle Lovett & His Large Band | |
189. | Radio Nizkor | - | Usa - Several attorneys challenge the Administration's effort to undermine Supreme Court decision on Gtmo. detainees. | |
190. | House of Large Sizes | Bankrupt in Hoven | House of Large Sizes & Treepeople Split 7'' | |
191. | Storm Large on ntgradio.com w/Charmaine Brooks | Storm Large on ntgradio.com w/Charmaine Brooks | Storm Large on ntgradio.com w/Charmaine Brooks | |
192. | Storm Large on ntgradio.com w/Charmaine Brooks | Storm Large on ntgradio.com w/Charmaine Brooks | Storm Large on ntgradio.com w/Charmaine Brooks | |
193. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
194. | D. Kevin McGrath and Minaxi Gupta, Indiana University, Bloomington | Behind Phishing: An Examination of Phisher Modi Operandi | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
195. | D. Kevin McGrath and Minaxi Gupta, Indiana University, Bloomington | Behind Phishing: An Examination of Phisher Modi Operandi | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
196. | Aaron J. Burstein, University of California, Berkeley, School of Law | Conducting Cybersecurity Research Legally and Ethically | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
197. | Abhinav Pathak and Y. Charlie Hu, Purdue University; Z. Morley Mao, University of Michigan | Peeking into Spammer Behavior from a Unique Vantage Point | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
198. | Aaron J. Burstein, University of California, Berkeley, School of Law | Conducting Cybersecurity Research Legally and Ethically | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
199. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
200. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |