| Policy-Driven Management of Data Sets | LISA '07 | Jim Holl, Kostadis Roussos, Jim Voll |
| ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems | LISA '07 | Damiano Bolzoni, Bruno Crispo, Sandro Etalle |
| PDA: A Tool for Automated Problem Determination | LISA '07 | Hai Huang, Raymond Jennings III, Yaoping Ruan, Ramendra Sahoo, Sambit Sahu, Anees Shaikh |
| Experiences with Scalable Network Operations at Akamai | LISA '07 | Erik Nygren |
| Usher: An Extensible Framework for Managing Clusters of Virtual Machines | LISA '07 | Marvin McNett, Diwaker Gupta, Amin Vahdat, Geoffrey M. Voelker |
| Remote Control: Distributed Application Configuration, Management, and Visualization with Plush | LISA '07 | Jeannie Albrecht, Ryan Braud, Darren Dao, Nikolay Topilski, Christopher Tuttle, Alex C. Snoeren |
| Everlab: A Production Platform for Research in Network Experimentation and Computation | LISA '07 | Elliot Jaffe, Danny Bickson, Scott Kirkpatrick |
| Using Throttling and Traffic Shaping to Combat Botnet Spam | LISA '07 | Ken Simpson |
| Master Education Programmes in Network and System Administration | LISA '07 | Karst Koymans |
| On Designing and Deploying Internet-Scale Services | LISA '07 | James Hamilton |
| RepuScore: Collaborative Reputation Management Framework for Email Infrastructure | LISA '07 | Gautam Singaraju, Brent ByungHoon Kang |
| Homeless Vikings: BGP Prefix Hijacking and the Spam Wars | LISA '07 | David Josephsen |
| The Economic Meltdown of Moore's Law and the Green Data Center | LISA '07 | Kenneth G. Brill |
| Moobi: A Thin Server Management System Using BitTorrent | LISA '07 | Chris McEniry |
| PoDIM: A Language for High-Level Configuration Management | LISA '07 | Thomas Delaet, Wouter Joosen |
| Network Patterns in Cfengine and Scalable Data Aggregation | LISA '07 | Matt Disney, Rolf Stadler |
| Data Center Growing Pains | LISA '07 | Lou Marchant |
| WORK-IN-PROGRESS REPORTS (WIPS) | LISA '07 | |
| How the iPod Shuffled the World as We Know It | USENIX Security '07 | Steven Levy |
| SIF: Enforcing Confidentiality and Integrity in Web Applications | USENIX Security '07 | Stephen Chong, K. Vikram, Andrew C. Myers |
| Combating Click Fraud via Premium Clicks | USENIX Security '07 | Ari Juels, Sid Stamm, Markus Jakobsson |
| SpyProxy: Execution-based Detection of Malicious Web Content | USENIX Security '07 | Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy |
| The Human Factor in Online Fraud | USENIX Security '07 | Markus Jakobsson |
| Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? | USENIX Security '07 | Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson |
| Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing | USENIX Security '07 | T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno |