Conferences

Search results

    TitleConferenceSpeaker(s)
    You Can't Build a Team in the Thunderdome: Better Hiring through EmpathyLISA16Ryan McKern
    Engineer the FutureLISA16Jinnah Hosein
    Don't Burn Out or Fade Away: Conquering Occupational BurnoutLISA16Avleen Vig
    Behind Closed Doors: Managing Passwords in a Dangerous WorldLISA16Noah Kantrowitz
    An Architect's Guide to Designing RiskLISA16Daemon Behr
    The Hard Truths about Microservices and Software DeliveryLISA16Anders Wallgren, Avantika Mathur
    How to Succeed in Ops without Really TryingLISA16Chastity Blackwell
    SRE at a StartUp: Lessons from LinkedInLISA16Craig Sebenik
    Traps and Cookies: A Mystery Package from Your Former SelfLISA16Tanya Reilly
    Capturing All of Stack Overflow's LogsLISA16George Beech
    How Should We Ops?LISA16Courtney Eckhardt
    Strategic StorytellingLISA16Jessica Hilt
    Stop Lying to Your Customers—the Cloud Is Neither Private Nor Secure: What Your Customers Need to Do for Privacy and Security, and How You Can Help ThemLISA16James "Brad" Whitehead
    Sensu and the Art of MonitoringLISA16Sean Porter
    UAVs, IoT, and CybersecurityLISA16David Kovar
    Building a Billion User Load BalancerLISA16Patrick Shuff
    Modern Cryptography Concepts: Hype or HopeLISA16Radia Perlman
    The Evolution of People, Process, and Technology in the Digital AgeLISA16John Roese
    Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability NotificationUSENIX Security '16Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, Michael Backes
    Identifying and Characterizing Sybils in the Tor NetworkUSENIX Security '16Philipp Winter, Roya Ensafi, Karsten Loesing, Nick Feamster
    You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and BehaviorsUSENIX Security '16Neil Zhenqiang Gong, Bin Liu
    What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP DefensesUSENIX Security '16Giorgi Maisuradze, Michael Backes, Christian Rossow
    PIkit: A New Kernel-Independent Processor-Interconnect RootkitUSENIX Security '16Wonjun Song, Hyunwoo Choi, Junhong Kim, Eunsoo Kim, Yongdae Kim, John Kim
    Stealing Machine Learning Models via Prediction APIsUSENIX Security '16Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart
    Protecting Privacy of BLE Device UsersUSENIX Security '16Kassem Fawaz, Kyu-Han Kim, Kang G. Shin

Pages