Conferences

Search results

    TitleConferenceSpeaker(s)
    Peeking into Spammer Behavior from a Unique Vantage PointLEET '08Abhinav Pathak, Y. Charlie Hu, Z. Morley Mao
    Behind Phishing: An Examination of Phisher Modi OperandiLEET '08D. Kevin McGrath, Minaxi Gupta
    Designing and Implementing Malicious HardwareLEET '08Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou
    Catching Instant Messaging Worms with Change-Point Detection TechniquesLEET '08Guanhua Yan, Zhen Xiao, Stephan Eidenbenz
    Exploiting Machine Learning to Subvert Your Spam FilterLEET '08Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I.P. Rubinstein, Udam Saini, Charles Sutton, Kai Xia
    Conducting Cybersecurity Research Legally and EthicallyLEET '08Aaron J. Burstein
    Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm WormLEET '08Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling
    The Heisenbot Uncertainty Problem: Challenges in Separating Bots from ChaffLEET '08Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage
    Ghost Turns Zombie: Exploring the Life Cycle of Web-based MalwareLEET '08Michalis Polychronakis, Panayiotis Mavrommatis
    Work-in-Progress SessionLEET '08
    How to Build a PB Sized Disk Storage SystemLISA '09Raymond L. Paden
    Eucalyptus: An Open Source Infrastructure for Cloud ComputingLISA '09Rich Wolski
    The Advanced Persistent ThreatLISA '09Michael K. Daly
    Google WaveLISA '09Daniel Berlin, Joe Gregorio
    Cosmic Computing: Supporting the Science of the Planck Space Based TelescopeLISA '09Shane Canon
    Crossbow Virtual Wire: Network in a BoxLISA '09Sunay Tripathi, Nicolas Droux, Kais Belgaied, Shrikrishna Khare
    EVA: A Framework for Network Analysis and Risk AssessmentLISA '09Melissa Danforth
    An Analysis of Network Configuration ArtifactsLISA '09David Plonka, Andres Jaan Tack
    Searching for Truth, or at Least Data: How to Be an Empiricist SkepticLISA '09Elizabeth D. Zwicky
    Secure Passwords Through Enhanced HashingLISA '09Benjamin Strahs, Chuan Yue, Haining Wang
    SEEdit: SELinux Security Policy Configuration System with Higher Level LanguageLISA '09Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Tabata
    An SSH-based Toolkit for User-based Network ServicesLISA '09Joyita Sikder, Manigandan Radhakrishnan, Jon A. Solworth
    Delay/Disruption Tolerant NetworkingLISA '09Keith Scott
    Towards Zero-Emission Datacenters Through Direct Reuse of Waste HeatLISA '09Bruno Michel
    Federated Access Control and Workflow Enforcement in Systems ConfigurationLISA '09Bart Vanbrabant, Thomas Delaet, Wouter Joosen

    Pages