ID | Interpret | Skladba | Album | |
1. | The One AM Radio | Credible Threats | Credible Threats | |
2. | Westside Connection | Lights Out | Terrorist Threats | |
3. | Westside Connection | Bangin' At The Party | Terrorist Threats | |
4. | Westside Connection | A Threat To The World | Terrorist Threats | |
5. | Westside Connection | Don't Get Outta Pocket | Terrorist Threats | |
6. | Westside Connection | Terrorist Threats | Terrorist Threats | |
7. | Westside Connection | Call 9-1-1 | Terrorist Threats | |
8. | Westside Connection | Get Ignit | Terrorist Threats | |
9. | Westside Connection | Potential Victims | Terrorist Threats | |
10. | Westside Connection | Pimp The System | Terrorist Threats | |
11. | Westside Connection | You Gotta Have Heart | Terrorist Threats | |
12. | Westside Connection | So Many Rappers In Love | Terrorist Threats | |
13. | Westside Connection | Izm | Terrorist Threats | |
14. | Panic Bomber | - | Calling in More Threats | |
15. | Greg Hobbs | Beautiful Girls (Live) | Threats And Promises | |
16. | Greg Hobbs | Beautiful Girls (Live) | Threats And Promises | |
17. | Greg Hobbs | Gospel Barroom | Threats & Promises | |
18. | Westside Connection | Superstar | Terrorist Threats | |
19. | Westside Connection | Gangsta Nation | Terrorist Threats | |
20. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
21. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
22. | D. Kevin McGrath and Minaxi Gupta, Indiana University, Bloomington | Behind Phishing: An Examination of Phisher Modi Operandi | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
23. | Aaron J. Burstein, University of California, Berkeley, School of Law | Conducting Cybersecurity Research Legally and Ethically | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
24. | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, University of California, San Diego | The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
25. | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, University of California, San Diego | The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
26. | Abhinav Pathak and Y. Charlie Hu, Purdue University; Z. Morley Mao, University of Michigan | Peeking into Spammer Behavior from a Unique Vantage Point | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
27. | Abhinav Pathak and Y. Charlie Hu, Purdue University; Z. Morley Mao, University of Michigan | Peeking into Spammer Behavior from a Unique Vantage Point | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
28. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
29. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
30. | Aaron J. Burstein, University of California, Berkeley, School of Law | Conducting Cybersecurity Research Legally and Ethically | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |