ID | Interpret | Skladba | Album | |
121. | Tea & Fiction | - | Tea & Fiction | |
122. | Pop Fiction | Enjoy the Silence | Pop Fiction | |
123. | Tea & Fiction | Talk | Tea & Fiction | |
124. | Tea & Fiction | You Don't Want To Be Found | Tea & Fiction II | |
125. | Robert Pollard | Their Biggest Win | Fiction Man | |
126. | Robert Pollard | Their Biggest Win | Fiction Man | |
127. | Dark Tranquillity | Empty Me | Fiction | |
128. | Tea & Fiction | Beach | Tea & Fiction | |
129. | Spell Check | Inspector | Fiction | |
130. | Bryan Harrison | It Must Be Saturday | AI Fan-Fiction | |
131. | Dark Tranquillity | The Mundane And The Magic | Fiction | |
132. | Dark Tranquillity | Blind At Heart | Fiction | |
133. | Dark Tranquillity | Blind At Heart | Fiction | |
134. | Dark Tranquillity | Focus Shift | Fiction | |
135. | Dark Tranquillity | Icipher | Fiction | |
136. | Dark Tranquillity | Misery's Crown | Fiction | |
137. | Dark Tranquillity | Below The Radiance | Fiction | |
138. | Dark Tranquillity | Empty Me | Fiction | |
139. | Tea & Fiction | Stay | Tea & Fiction | |
140. | Tea & Fiction | See | Tea & Fiction | |
141. | Tea & Fiction | - | Tea & Fiction | |
142. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
143. | Abhinav Pathak and Y. Charlie Hu, Purdue University; Z. Morley Mao, University of Michigan | Peeking into Spammer Behavior from a Unique Vantage Point | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
144. | Abhinav Pathak and Y. Charlie Hu, Purdue University; Z. Morley Mao, University of Michigan | Peeking into Spammer Behavior from a Unique Vantage Point | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
145. | Aaron J. Burstein, University of California, Berkeley, School of Law | Conducting Cybersecurity Research Legally and Ethically | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
146. | Aaron J. Burstein, University of California, Berkeley, School of Law | Conducting Cybersecurity Research Legally and Ethically | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
147. | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, University of California, San Diego | The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
148. | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, University of California, San Diego | The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
149. | D. Kevin McGrath and Minaxi Gupta, Indiana University, Bloomington | Behind Phishing: An Examination of Phisher Modi Operandi | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
150. | D. Kevin McGrath and Minaxi Gupta, Indiana University, Bloomington | Behind Phishing: An Examination of Phisher Modi Operandi | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |