Papers

Search results

    ConferenceTitleAuthor(s)
    LISA '12Preventing the Revealing of Online Passwords to Inappropriate Websites with LoginInspectorChuan Yue
    LISA '12XUTools: Unix Commands for Processing Next-Generation Structured TextGabriel A. Weaver, Sean W. Smith
    LISA '12Teaching System AdministrationSteve VanDevender
    LISA '12Training and Professional Development in an IT CommunityGeorge William Herbert
    LISA '12Extensible Monitoring with Nagios and Messaging MiddlewareJonathan Reams
    LISA '12Efficient Multidimensional Aggregation for Large Scale Monitoring Lautaro Dolberg, Jerome Francois, Thomas Engel
    LISA '12What Your CDN Won't Tell You: Optimizing a News Website for Speed and StabilityJulian Dunn, Blake Crosby
    LISA '12Building a 100K log/sec Logging InfrastructureDavid Lang
    LISA '12Building a Protocol Validator for Business to Business Communications Rudi van Drunen
    LISA '12Building the Network Infrastructure for the International Mathematics Olympiad Rudi van Drunen
    LISA '12Building a Wireless Network for a High Density of Users David Lang
    LISA '12DNSSEC Deployment in .gov: Progress and Lessons LearnedScott Rose
    LISA '11Provenance for System TroubleshootingMarc Chiarini
    LISA '11Debugging Makefiles with remakeRocky Bernstein
    LISA '11Why Do Migrations Fail and What Can We Do about It?Gong Zhang, Ling Liu
    LISA '11Getting to Elastic: Adapting a Legacy Vertical Application Environment for ScalabilityEric Shamow
    LISA '11Scaling on EC2 in a Fast-Paced Environment (Practice & Experience Report)Nicolas Brousse
    LISA '11DarkNOC: Dashboard for Honeypot ManagementBertrand Sobesto, Michel Cukier, Matti Hiltunen, Dave Kormann, Gregg Vesonder, Robin Berthier
    LISA '11A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large NetworksDamiano Bolzoni, Christiaan Schade, Sandro Etalle
    LISA '11Auto-learning of SMTP TCP Transport-Layer Features for Spam and Abusive Message DetectionGeorgios Kakavelakis, Joel Young
    LISA '11Using Active Intrusion Detection to Recover Network TrustJohn F. Williamson, Sergey Bratus, Michael E. Locasto
    LISA '11Community-based Analysis of Netflow for Early Detection of Security IncidentsStefan Weigert, Matti A. Hiltunen, Christof Fetzer
    LISA '11WCIS: A Prototype for Detecting Zero-Day Attacks in Web Server RequestsMelissa Danforth
    LISA '11Automating Network and Service Configuration Using NETCONF and YANGStefan Wallin, Claes Wikström
    LISA '11Adventures in (Small) Datacenter Migration (Practice & Experience Report)Jon Kuroda, Jeff Anderson-Lee, Albert Goto, Scott McNally

Pages