Search results

    Enhancing Network Security through Competitive Cyber ExercisesUSENIX ATC '05Colonel Daniel Ragsdale
    Linux and JPL's Mars Exploration Rover Project: Earth-based Planning, Simulation, and Really Remote SchedulingUSENIX ATC '05Scott Maxwell, Frank Hartman
    Possible Futures for SoftwareUSENIX ATC '05Vernor Vinge
    Flying LinuxUSENIX ATC '05Dan Klein
    NFSv4USENIX ATC '05Spencer Shepler
    Keynote Address Going Digital at CNN LISA '04
    A New Approach to Scripting LISA '04Trey Harris
    What Spammers Are Doing to Get Around Bayesian Filtering & What We Can Expect for the Future LISA '04John Graham-Cumming
    System Administration and Sex Therapy: The Gentle Art of DebuggingLISA '04David Blank-Edelman
    Lessons Learned from Howard Dean's Digital Campaign LISA '04Keri Carpenter, Tom Limoncelli
    I Voted? How the Law Increasingly Restricts Independent Security ResearchUSENIX Security '04Cindy Cohn
    Metrics, Economics, and Shared Risk at the National ScaleUSENIX Security '04Dan Geer
    Nuclear Weapons, Permissive Action Links, and the History of Public Key CryptographyUSENIX Security '04Steve Bellovin
    Open Source and Proprietary Software: A Blending of CulturesUSENIX ATC '04Alan Nugent
    Network Complexity: How Do I Manage All of This?USENIX ATC '04Eliot Lear
    Thinking Sensibly About Security in an Uncertain WorldUSENIX ATC '04Bruce Schneier
    Debate: Is an Operating System Monoculture a Threat to Security?USENIX ATC '04Dan Geer, Scott Charney
    Cheap Hardware + Fault Tolerance = Web SiteUSENIX ATC '04Rob Pike
    The State of the SpamUSENIX ATC '04Eric Allman Facing a World CrisisLISA 2001William LeFebvre