Skip to main content
USENIX supports diversity, equity, and inclusion and condemns hate and discrimination
.
About
Conferences
Publications
Membership
Students
Search
Donate Today
Sign In
Search
About
USENIX Board
Staff
Newsroom
Good Works
Blog
Governance and Financials
USENIX Awards
USENIX Supporters
2024 Board Election
Board Meeting Minutes
Annual Fund
Conferences
Upcoming
By Name
Calls for Papers
Grants
Sponsorship
Best Papers
Test of Time Awards
Multimedia
Conference FAQ
Conference Policies
Code of Conduct
Publications
Proceedings
Author Resources
;login: Online
Writing for ;login: Online
;login: Archive
Membership
Students
Conference Fees
Campus Representative Program
Student Grant Program
Search
Donate Today
Donate Today
How Should We Ops?
Submitted by
joey
on January 4, 2017 - 6:03 am
Eckhardt C
. 2016.
How Should We Ops?
Read more
about How Should We Ops?
DBLP
Log in
or
Register
to post comments
Google Scholar
BibTeX
Strategic Storytelling
Submitted by
joey
on January 4, 2017 - 6:01 am
Hilt J
. 2016.
Strategic Storytelling
.
Read more
about Strategic Storytelling
DBLP
Log in
or
Register
to post comments
Google Scholar
BibTeX
Modern Cryptography Concepts: Hype or Hope
Submitted by
joey
on January 4, 2017 - 5:59 am
Perlman R
. 2016.
Modern Cryptography Concepts: Hype or Hope
.
Read more
about Modern Cryptography Concepts: Hype or Hope
DBLP
Log in
or
Register
to post comments
Google Scholar
BibTeX
Sensu and the Art of Monitoring
Submitted by
joey
on January 4, 2017 - 5:58 am
Porter S
. 2016.
Sensu and the Art of Monitoring
.
Read more
about Sensu and the Art of Monitoring
DBLP
Log in
or
Register
to post comments
Google Scholar
BibTeX
Building a Billion User Load Balancer
Submitted by
joey
on January 4, 2017 - 5:57 am
Shuff P
. 2016.
Building a Billion User Load Balancer
.
Read more
about Building a Billion User Load Balancer
DBLP
Log in
or
Register
to post comments
Google Scholar
BibTeX
Stop Lying to Your {Customers—the} Cloud Is Neither Private Nor Secure: What Your Customers Need to Do for Privacy and Security, and How You Can Help Them
Submitted by
joey
on January 4, 2017 - 5:56 am
Whitehead J
. 2016.
Stop Lying to Your {Customers—the} Cloud Is Neither Private Nor Secure: What Your Customers Need to Do for Privacy and Security, and How You Can Help Them
.
Read more
about Stop Lying to Your {Customers—the} Cloud Is Neither Private Nor Secure: What Your Customers Need to Do for Privacy and Security, and How You Can Help Them
DBLP
Log in
or
Register
to post comments
Google Scholar
BibTeX
{UAVs}, {IoT}, and Cybersecurity
Submitted by
joey
on January 4, 2017 - 5:54 am
Kovar D
. 2016.
{UAVs}, {IoT}, and Cybersecurity
.
Read more
about {UAVs}, {IoT}, and Cybersecurity
DBLP
Log in
or
Register
to post comments
Google Scholar
BibTeX
Effect of Cognitive Depletion on Password Choice
Submitted by
michele
on January 3, 2017 - 2:52 pm
Gross T
,
Coopamootoo K
,
Al-Jabri A
. 2016.
Effect of Cognitive Depletion on Password Choice
.
The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2016). :55--66.
Read more
about Effect of Cognitive Depletion on Password Choice
DBLP
Log in
or
Register
to post comments
Google Scholar
BibTeX
Combining Qualitative Coding and Sentiment Analysis: Deconstructing Perceptions of Usable Security in Organisations
Submitted by
michele
on January 3, 2017 - 2:51 pm
Becker I
,
Parkin S
,
M. Sasse A
. 2016.
Combining Qualitative Coding and Sentiment Analysis: Deconstructing Perceptions of Usable Security in Organisations
.
The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2016). :43--53.
Read more
about Combining Qualitative Coding and Sentiment Analysis: Deconstructing Perceptions of Usable Security in Organisations
DBLP
Log in
or
Register
to post comments
Google Scholar
BibTeX
Results and Lessons Learned from a User Study of Display Effectiveness with Experienced Cyber Security Network Analysts
Submitted by
michele
on January 3, 2017 - 2:51 pm
Garneau CJ
,
Erbacher RF
,
Etoty RE
,
Hutchinson SE
. 2016.
Results and Lessons Learned from a User Study of Display Effectiveness with Experienced Cyber Security Network Analysts
.
The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2016). :33--42.
Read more
about Results and Lessons Learned from a User Study of Display Effectiveness with Experienced Cyber Security Network Analysts
DBLP
Log in
or
Register
to post comments
Google Scholar
BibTeX
Pages
« first
‹ previous
…
1488
1489
1490
1491
1492
1493
1494
1495
1496
…
next ›
last »