You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group


    Decision Support for Virtual Machine Re-Provisioning in Production EnvironmentsLISA '07Kyrre Begnum, Matthew Disney, Ingard Mevåg
    OS Circular: Internet Client for ReferenceLISA '07Kuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, Nguyen Anh Quynh
    Secure Isolation of Untrusted Legacy ApplicationsLISA '07Shaya Potter, Jason Nieh, Matt Selsky
    Who's the Boss? Autonomics and New-Fangled Security Gizmos with Minds of Their OwnLISA '07Glenn Fink
    No Terabyte Left BehindLISA '07Andrew Hume
    NetADHICT: A Tool for Understanding Network TrafficLISA '07Hajime Inoue, Dana Jansens, Abdulrahman Hijazi, Anil Somayaji
    Scaling Production Repairs and QA Operations in a Live EnvironmentLISA '07Shane Knapp, Avleen Vig
    A Service-Oriented Data Grid: Beyond Storage VirtualizationLISA '07Bruce Moxon
    CAMP: A Common API for Measuring PerformanceLISA '07Mark Gabel, Michael Haungs
    Application Buffer-Cache Management for Performance: Running the World’s Largest MRTGLISA '07David Plonka, Archit Gupta, Dale Carder
    PolicyVis: Firewall Security Policy Visualization and InspectionLISA '07Tung Tran, Ehab Al-Shaer, Raouf Boutaba
    The Biggest Game of Clue® You Have Ever PlayedLISA '07Don Scelza
    Deploying Nagios in a Large Enterprise EnvironmentLISA '07Carson Gaspar
    Inferring Higher Level Policies from Firewall RulesLISA '07Alok Tongaonkar, Niranjan Inamdar, R. Sekar
    Assisted Firewall Policy Repair Using Examples and HistoryLISA '07Robert Marmorstein, Phil Kearns
    Autonomic Administration: HAL 9000 Meets Gene RoddenberryLISA '07John Strassner
    Work-in-Progress Reports (WiPs) and Closing RemarksUSENIX Security '07
    On Attack Causality in Internet-Connected Cellular NetworksUSENIX Security '07Patrick McDaniel
    Proximity Breeds Danger: Emerging Threats in Metro-area Wireless NetworksUSENIX Security '07P. Akritidis, W.Y. Chin, V.T. Lam, S. Sidiroglou, K.G. Anagnostakis
    On Web Browsing Privacy in Anonymized NetFlowsUSENIX Security '07S.E. Coull, M.P. Collins, C.V. Wright, F. Monrose, M.K. Reiter
    Covering Computer Security in The New York TimesUSENIX Security '07John Schwartz
    Binary Obfuscation Using SignalsUSENIX Security '07Igor V. Popov, Saumya K. Debray, Gregory R. Andrews
    Active Hardware Metering for Intellectual Property Protection and SecurityUSENIX Security '07Yousra M. Alkabani, Farinaz Koushanfar
    Advanced RootkitsUSENIX Security '07Greg Hoglund
    Report of the California Voting Systems ReviewUSENIX Security '07David Wagner