Conferences

Search results

    TitleConferenceSpeaker(s)
    Policy-Driven Management of Data SetsLISA '07Jim Holl, Kostadis Roussos, Jim Voll
    ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection SystemsLISA '07Damiano Bolzoni, Bruno Crispo, Sandro Etalle
    PDA: A Tool for Automated Problem DeterminationLISA '07Hai Huang, Raymond Jennings III, Yaoping Ruan, Ramendra Sahoo, Sambit Sahu, Anees Shaikh
    Experiences with Scalable Network Operations at AkamaiLISA '07Erik Nygren
    Usher: An Extensible Framework for Managing Clusters of Virtual MachinesLISA '07Marvin McNett, Diwaker Gupta, Amin Vahdat, Geoffrey M. Voelker
    Remote Control: Distributed Application Configuration, Management, and Visualization with PlushLISA '07Jeannie Albrecht, Ryan Braud, Darren Dao, Nikolay Topilski, Christopher Tuttle, Alex C. Snoeren
    Everlab: A Production Platform for Research in Network Experimentation and ComputationLISA '07Elliot Jaffe, Danny Bickson, Scott Kirkpatrick
    Using Throttling and Traffic Shaping to Combat Botnet SpamLISA '07Ken Simpson
    Master Education Programmes in Network and System AdministrationLISA '07Karst Koymans
    On Designing and Deploying Internet-Scale ServicesLISA '07James Hamilton
    RepuScore: Collaborative Reputation Management Framework for Email InfrastructureLISA '07Gautam Singaraju, Brent ByungHoon Kang
    Homeless Vikings: BGP Prefix Hijacking and the Spam WarsLISA '07David Josephsen
    The Economic Meltdown of Moore's Law and the Green Data CenterLISA '07Kenneth G. Brill
    Moobi: A Thin Server Management System Using BitTorrentLISA '07Chris McEniry
    PoDIM: A Language for High-Level Configuration ManagementLISA '07Thomas Delaet, Wouter Joosen
    Network Patterns in Cfengine and Scalable Data AggregationLISA '07Matt Disney, Rolf Stadler
    Data Center Growing PainsLISA '07Lou Marchant
    WORK-IN-PROGRESS REPORTS (WIPS)LISA '07
    How the iPod Shuffled the World as We Know ItUSENIX Security '07Steven Levy
    SIF: Enforcing Confidentiality and Integrity in Web ApplicationsUSENIX Security '07Stephen Chong, K. Vikram, Andrew C. Myers
    Combating Click Fraud via Premium ClicksUSENIX Security '07Ari Juels, Sid Stamm, Markus Jakobsson
    SpyProxy: Execution-based Detection of Malicious Web ContentUSENIX Security '07Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy
    The Human Factor in Online FraudUSENIX Security '07Markus Jakobsson
    Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?USENIX Security '07Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson
    Devices That Tell on You: Privacy Trends in Consumer Ubiquitous ComputingUSENIX Security '07T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno

Pages