LISA '11 | Getting to Elastic: Adapting a Legacy Vertical Application Environment for Scalability | Eric Shamow |
LISA '11 | Scaling on EC2 in a Fast-Paced Environment (Practice & Experience Report) | Nicolas Brousse |
LISA '11 | DarkNOC: Dashboard for Honeypot Management | Bertrand Sobesto, Michel Cukier, Matti Hiltunen, Dave Kormann, Gregg Vesonder, Robin Berthier |
LISA '11 | A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks | Damiano Bolzoni, Christiaan Schade, Sandro Etalle |
LISA '11 | Auto-learning of SMTP TCP Transport-Layer Features for Spam and Abusive Message Detection | Georgios Kakavelakis, Joel Young |
LISA '11 | Using Active Intrusion Detection to Recover Network Trust | John F. Williamson, Sergey Bratus, Michael E. Locasto |
LISA '11 | Community-based Analysis of Netflow for Early Detection of Security Incidents | Stefan Weigert, Matti A. Hiltunen, Christof Fetzer |
LISA '11 | WCIS: A Prototype for Detecting Zero-Day Attacks in Web Server Requests | Melissa Danforth |
LISA '11 | Automating Network and Service Configuration Using NETCONF and YANG | Stefan Wallin, Claes Wikström |
LISA '11 | Adventures in (Small) Datacenter Migration (Practice & Experience Report) | Jon Kuroda, Jeff Anderson-Lee, Albert Goto, Scott McNally |
LISA '11 | Experiences with BOWL: Managing an Outdoor WiFi Network (or How to Keep Both Internet Users and Researchers Happy?) (Practice & Experience Report) | T. Fischer, T. Hühn, R. Kuck, R. Merz, J. Schulz-Zander, C. Sengul |
LISA '11 | Why Do Migrations Fail and What Can We Do about It? | Gong Zhang, Ling Liu |
LISA '11 | Provenance for System Troubleshooting | Marc Chiarini |
LISA '11 | Debugging Makefiles with remake | Rocky Bernstein |
LISA '10 | A Survey of System Configuration Tools | Thomas Delaet, Wouter Joosen, Bart Vanbrabant |
LISA '10 | High Performance Multi-Node File Copies and Checksums for Clustered File Systems | Paul Z. Kolano, Robert B. Ciotti |
LISA '10 | Fast and Secure Laptop Backups with Encrypted De-duplication | Paul Anderson, Le Zhang |
LISA '10 | The Margrave Tool for Firewall Analysis | Timothy Nelson, Christopher Barratt, Daniel J. Dougherty, Kathi Fisler, Shriram Krishnamurthi |
LISA '10 | Towards Automatic Update of Access Control Policy | Jinwei Hu, Yan Zhang, Ruixuan Li |
LISA '10 | First Step Towards Automatic Correction of Firewall Policy Faults | Fei Chen, Alex X. Liu, JeeHyun Hwang, Tao Xie |
LISA '10 | When Anti-virus Doesn't Cut It: Catching Malware with SIEM | Wyman Stocks |
LISA '10 | In-Flight Mechanics: A Software Package Management Conversion Project | Philip J. Hollenback |
LISA '10 | Experiences with Eucalyptus: Deploying an Open Source Cloud | Rick Bradshaw, Piotr T Zbiegiel |
LISA '10 | Using TCP/IP Traffic Shaping to Achieve iSCSI Service Predictability | J. Bjørgeengen, H. Haugerud |
LISA '10 | YAF: Yet Another Flowmeter | Christopher M. Inacio, Brian Trammell |