A whole new look is coming
Check back again soon!
Menu
Toggle menu visibility
About
Conferences
Upcoming
By Name
Calls for Papers
Grants
Sponsorship
Best Papers
Test of Time Awards
Multimedia
Conference FAQ
Conference Policies
Code of Conduct
Publications
Membership
Students
Search
Donate Today
Sign In
Search
About
USENIX Board
Staff
Good Works
Blog
Governance and Financials
USENIX Awards
USENIX Supporters
2024 Board Election
Board Meeting Minutes
Donate
Conferences
Upcoming
By Name
Calls for Papers
Grants
Sponsorship
Best Papers
Test of Time Awards
Multimedia
Conference FAQ
Conference Policies
Code of Conduct
Publications
Proceedings
Author Resources
;login: Online
Writing for ;login: Online
;login: Archive
Membership
Students
Conference Fees
Student Grant Program
Search
Donate Today
Conferences
Multimedia
Conferences
Donate Today
Enter terms
Retain current filters
Search results
Title
Conference
Speaker(s)
RepuScore: Collaborative Reputation Management Framework for Email Infrastructure
LISA '07
Gautam Singaraju, Brent ByungHoon Kang
Homeless Vikings: BGP Prefix Hijacking and the Spam Wars
LISA '07
David Josephsen
The Economic Meltdown of Moore's Law and the Green Data Center
LISA '07
Kenneth G. Brill
Moobi: A Thin Server Management System Using BitTorrent
LISA '07
Chris McEniry
PoDIM: A Language for High-Level Configuration Management
LISA '07
Thomas Delaet, Wouter Joosen
Network Patterns in Cfengine and Scalable Data Aggregation
LISA '07
Matt Disney, Rolf Stadler
Data Center Growing Pains
LISA '07
Lou Marchant
WORK-IN-PROGRESS REPORTS (WIPS)
LISA '07
How the iPod Shuffled the World as We Know It
USENIX Security '07
Steven Levy
SIF: Enforcing Confidentiality and Integrity in Web Applications
USENIX Security '07
Stephen Chong, K. Vikram, Andrew C. Myers
Combating Click Fraud via Premium Clicks
USENIX Security '07
Ari Juels, Sid Stamm, Markus Jakobsson
SpyProxy: Execution-based Detection of Malicious Web Content
USENIX Security '07
Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy
The Human Factor in Online Fraud
USENIX Security '07
Markus Jakobsson
Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?
USENIX Security '07
Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson
Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing
USENIX Security '07
T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno
Web-Based Inference Detection
USENIX Security '07
Jessica Staddon, Philippe Golle, Bryce Zimny
Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks
USENIX Security '07
Saar Drimer, Steven J. Murdoch
Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords
USENIX Security '07
Julie Thorpe, P.C. van Oorschot
Halting Password Puzzles: Hard-to-break Encryption from Human-memorable Keys
USENIX Security '07
Xavier Boyen
How to Obtain and Assert Composable Security
USENIX Security '07
Ran Canetti
Spamscatter: Characterizing Internet Scam Hosting Infrastructure
USENIX Security '07
David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker
Exploiting Network Structure for Proactive Spam Mitigation
USENIX Security '07
Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
USENIX Security '07
Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong
Opening Remarks
USENIX ATC '06
PlanetLab: Evolution vs. Intelligent Design in Planetary-Scale Infrastructure
USENIX ATC '06
Larry Peterson
Pages
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »