ID | Interpret | Skladba | Album | |
61. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
62. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
63. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
64. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
65. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
66. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
67. | Dagfinn Føllesdal, Bruna de Marchi, Merle Jacob and Ian Hacking | Discussion | Holberg Prize Symposium 2009: Ian Hacking | |
68. | Dagfinn Føllesdal, Bruna de Marchi, Merle Jacob and Ian Hacking | Discussion | Holberg Prize Symposium 2009: Ian Hacking | |
69. | Humanitarian FOSS Project | Panel on "Open Source in the Curriculum" | Humanitarian FOSS Project Symposium 2009 | |
70. | UC Irvine The Great Park Studio | Great Park: Irvine / Design Symposium | Great Park: Irvine / Design Symposium | |
71. | Ian Hacking | Comments | Holberg Prize Symposium 2009: Ian Hacking | |
72. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
73. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
74. | Stephen Downes | Ruby, Blackboard, and the Challenge for Open Source | Free Software and Open Source Symposium | |
75. | Ian Hacking | Comments | Holberg Prize Symposium 2009: Ian Hacking | |
76. | Stephen Downes | Ruby, Blackboard, and the Challenge for Open Source | Free Software and Open Source Symposium | |
77. | Rui Wang and XiaoFeng Wang, Indiana University at Bloomington; Zhuowei Li, Center for Software Excellence, Microsoft | Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software | 17th USENIX Security Symposium Refereed Papers | |
78. | Negar Kiyavash, Amir Houmansadr, and Nikita Borisov, University of Illinois at Urbana-Champaign | Multi-flow Attacks Against Network Flow Watermarking Schemes | 17th USENIX Security Symposium Refereed Papers | |
79. | Jose Nazario, Senior Security Engineer, Arbor Networks | Political DDoS: Estonia and Beyond | 17th USENIX Security Symposium Invited Talks | |
80. | Guofei Gu, Georgia Institute of Technology; Roberto Perdisci, Damballa, Inc.; Junjie Zhang and Wenke Lee, Georgia Institute of Technology | BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | 17th USENIX Security Symposium Refereed Papers | |
81. | Niels Provos, Google, Inc. | The Ghost in the Browser and Other Frightening Stories About Web Malware | 17th USENIX Security Symposium Invited Talks | |
82. | Michael Dalton, Hari Kannan, and Christos Kozyrakis, Stanford University | Real-World Buffer Overflow Protection for User and Kernel Space | 17th USENIX Security Symposium Refereed Papers | |
83. | Lucas Ballard and Seny Kamara, The Johns Hopkins University; Michael K. Reiter, University of North Carolina at Chapel Hill | The Practical Subtleties of Biometric Key Generation | 17th USENIX Security Symposium Refereed Papers | |
84. | Charles Bernstein | annagrammatica from Shadowtime | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
85. | Charles Bernstein | on Blind Witness | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
86. | Charles Bernstein | All the Whiskey in Heaven | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
87. | Charles Bernstein | Kiss Me Tommy | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
88. | Charles Bernstein | introduction to | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
89. | Karsten Nohl and David Evans, University of Virginia; Starbug and Henryk Plötz, Chaos Computer Club, Berlin | Reverse-Engineering a Cryptographic RFID Tag | 17th USENIX Security Symposium Refereed Papers | |
90. | Byung-Gon Chun, ICSI; Sylvia Ratnasamy, Intel Research Berkeley; Eddie Kohler, University of California, Los Angeles | NetComplex: A Complexity Metric for Networked System Designs | 5th USENIX Symposium on Networked Systems Design and Implementation | |