ID | Interpret | Skladba | Album | |
31. | Bad Boost Energy | cold wind | Gray Scale | |
32. | Bad Boost Energy | new moon | Gray Scale | |
33. | half-handed cloud | can't even breathe on my own | learning about your scale | |
34. | David Cunningham | Error System (BAGFGAB) | Grey Scale | |
35. | Ne-Yo | Crazy Love | Libra Scale | |
36. | Don Nino | a 1000 lights | On the bright scale | |
37. | Man Or Astro Man? | A Simple Text File | A Spectrum Of Infinite Scale | |
38. | Half-handed Cloud | To Love Like The Father & Son Love Each Other | SF04/AK-Learning About Your Scale | |
39. | Half-handed Cloud | To Love Like The Father & Son Love Each Other | SF04/AK-Learning About Your Scale | |
40. | The Kallikak Family | >Hands Clenched | Vineland Social Maturity Scale | |
41. | Corey McCafferty | Commercial Subtext | [axp003] 1/4 Scale Model Of The Liar's Psyche | |
42. | Corey McCafferty | The Deepest Hole | [axp003] 1/4 Scale Model Of The Liar's Psyche | |
43. | Corey McCafferty | 1/4 Scale Model Of The Liar's Psyche | [axp003] 1/4 Scale Model Of The Liar's Psyche | |
44. | Corey McCafferty | Scandal At The Drake | [axp003] 1/4 Scale Model Of The Liar's Psyche | |
45. | Corey McCafferty | Celebrity Stalkers | [axp003] 1/4 Scale Model Of The Liar's Psyche | |
46. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
47. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
48. | Aaron J. Burstein, University of California, Berkeley, School of Law | Conducting Cybersecurity Research Legally and Ethically | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
49. | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, University of California, San Diego | The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
50. | D. Kevin McGrath and Minaxi Gupta, Indiana University, Bloomington | Behind Phishing: An Examination of Phisher Modi Operandi | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
51. | Abhinav Pathak and Y. Charlie Hu, Purdue University; Z. Morley Mao, University of Michigan | Peeking into Spammer Behavior from a Unique Vantage Point | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
52. | Abhinav Pathak and Y. Charlie Hu, Purdue University; Z. Morley Mao, University of Michigan | Peeking into Spammer Behavior from a Unique Vantage Point | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
53. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
54. | Aaron J. Burstein, University of California, Berkeley, School of Law | Conducting Cybersecurity Research Legally and Ethically | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
55. | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, University of California, San Diego | The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
56. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
57. | D. Kevin McGrath and Minaxi Gupta, Indiana University, Bloomington | Behind Phishing: An Examination of Phisher Modi Operandi | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |