A whole new look is coming
Check back again soon!
Menu
Toggle menu visibility
About
Conferences
Upcoming
By Name
Calls for Papers
Grants
Sponsorship
Best Papers
Test of Time Awards
Multimedia
Conference FAQ
Conference Policies
Code of Conduct
Publications
Membership
Students
Search
Donate Today
Sign In
Search
About
USENIX Board
Staff
Good Works
Blog
Governance and Financials
USENIX Awards
USENIX Supporters
2024 Board Election
Board Meeting Minutes
Donate
Conferences
Upcoming
By Name
Calls for Papers
Grants
Sponsorship
Best Papers
Test of Time Awards
Multimedia
Conference FAQ
Conference Policies
Code of Conduct
Publications
Proceedings
Author Resources
;login: Online
Writing for ;login: Online
;login: Archive
Membership
Students
Conference Fees
Student Grant Program
Search
Donate Today
Conferences
Multimedia
Conferences
Donate Today
Enter terms
Retain current filters
Search results
Title
Conference
Speaker(s)
Peeking into Spammer Behavior from a Unique Vantage Point
LEET '08
Abhinav Pathak, Y. Charlie Hu, Z. Morley Mao
Behind Phishing: An Examination of Phisher Modi Operandi
LEET '08
D. Kevin McGrath, Minaxi Gupta
Designing and Implementing Malicious Hardware
LEET '08
Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou
Catching Instant Messaging Worms with Change-Point Detection Techniques
LEET '08
Guanhua Yan, Zhen Xiao, Stephan Eidenbenz
Exploiting Machine Learning to Subvert Your Spam Filter
LEET '08
Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I.P. Rubinstein, Udam Saini, Charles Sutton, Kai Xia
Conducting Cybersecurity Research Legally and Ethically
LEET '08
Aaron J. Burstein
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
LEET '08
Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff
LEET '08
Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage
Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware
LEET '08
Michalis Polychronakis, Panayiotis Mavrommatis
Work-in-Progress Session
LEET '08
How to Build a PB Sized Disk Storage System
LISA '09
Raymond L. Paden
Eucalyptus: An Open Source Infrastructure for Cloud Computing
LISA '09
Rich Wolski
The Advanced Persistent Threat
LISA '09
Michael K. Daly
Google Wave
LISA '09
Daniel Berlin, Joe Gregorio
Cosmic Computing: Supporting the Science of the Planck Space Based Telescope
LISA '09
Shane Canon
Crossbow Virtual Wire: Network in a Box
LISA '09
Sunay Tripathi, Nicolas Droux, Kais Belgaied, Shrikrishna Khare
EVA: A Framework for Network Analysis and Risk Assessment
LISA '09
Melissa Danforth
An Analysis of Network Configuration Artifacts
LISA '09
David Plonka, Andres Jaan Tack
Searching for Truth, or at Least Data: How to Be an Empiricist Skeptic
LISA '09
Elizabeth D. Zwicky
Secure Passwords Through Enhanced Hashing
LISA '09
Benjamin Strahs, Chuan Yue, Haining Wang
SEEdit: SELinux Security Policy Configuration System with Higher Level Language
LISA '09
Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Tabata
An SSH-based Toolkit for User-based Network Services
LISA '09
Joyita Sikder, Manigandan Radhakrishnan, Jon A. Solworth
Delay/Disruption Tolerant Networking
LISA '09
Keith Scott
Towards Zero-Emission Datacenters Through Direct Reuse of Waste Heat
LISA '09
Bruno Michel
Federated Access Control and Workflow Enforcement in Systems Configuration
LISA '09
Bart Vanbrabant, Thomas Delaet, Wouter Joosen
Pages
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »