LISA '12 | Preventing the Revealing of Online Passwords to Inappropriate Websites with LoginInspector | Chuan Yue |
LISA '12 | XUTools: Unix Commands for Processing Next-Generation Structured Text | Gabriel A. Weaver, Sean W. Smith |
LISA '12 | Teaching System Administration | Steve VanDevender |
LISA '12 | Training and Professional Development in an IT Community | George William Herbert |
LISA '12 | Extensible Monitoring with Nagios and Messaging Middleware | Jonathan Reams |
LISA '12 | Efficient Multidimensional Aggregation for Large Scale Monitoring | Lautaro Dolberg, Jerome Francois, Thomas Engel |
LISA '12 | What Your CDN Won't Tell You: Optimizing a News Website for Speed and Stability | Julian Dunn, Blake Crosby |
LISA '12 | Building a 100K log/sec Logging Infrastructure | David Lang |
LISA '12 | Building a Protocol Validator for Business to Business Communications | Rudi van Drunen |
LISA '12 | Building the Network Infrastructure for the International Mathematics Olympiad | Rudi van Drunen |
LISA '12 | Building a Wireless Network for a High Density of Users | David Lang |
LISA '12 | DNSSEC Deployment in .gov: Progress and Lessons Learned | Scott Rose |
LISA '11 | Provenance for System Troubleshooting | Marc Chiarini |
LISA '11 | Debugging Makefiles with remake | Rocky Bernstein |
LISA '11 | Why Do Migrations Fail and What Can We Do about It? | Gong Zhang, Ling Liu |
LISA '11 | Getting to Elastic: Adapting a Legacy Vertical Application Environment for Scalability | Eric Shamow |
LISA '11 | Scaling on EC2 in a Fast-Paced Environment (Practice & Experience Report) | Nicolas Brousse |
LISA '11 | DarkNOC: Dashboard for Honeypot Management | Bertrand Sobesto, Michel Cukier, Matti Hiltunen, Dave Kormann, Gregg Vesonder, Robin Berthier |
LISA '11 | A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks | Damiano Bolzoni, Christiaan Schade, Sandro Etalle |
LISA '11 | Auto-learning of SMTP TCP Transport-Layer Features for Spam and Abusive Message Detection | Georgios Kakavelakis, Joel Young |
LISA '11 | Using Active Intrusion Detection to Recover Network Trust | John F. Williamson, Sergey Bratus, Michael E. Locasto |
LISA '11 | Community-based Analysis of Netflow for Early Detection of Security Incidents | Stefan Weigert, Matti A. Hiltunen, Christof Fetzer |
LISA '11 | WCIS: A Prototype for Detecting Zero-Day Attacks in Web Server Requests | Melissa Danforth |
LISA '11 | Automating Network and Service Configuration Using NETCONF and YANG | Stefan Wallin, Claes Wikström |
LISA '11 | Adventures in (Small) Datacenter Migration (Practice & Experience Report) | Jon Kuroda, Jeff Anderson-Lee, Albert Goto, Scott McNally |