ID | Interpret | Skladba | Album | |
31. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
32. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
33. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
34. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
35. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
36. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
37. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
38. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
39. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
40. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
41. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
42. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
43. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
44. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
45. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
46. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
47. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
48. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
49. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
50. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
51. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
52. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
53. | Guofei Gu, Georgia Institute of Technology; Roberto Perdisci, Damballa, Inc.; Junjie Zhang and Wenke Lee, Georgia Institute of Technology | BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | 17th USENIX Security Symposium Refereed Papers | |
54. | J. Alex Halderman, Princeton University; Seth D. Schoen, Electronic Frontier Foundation; Nadia Heninger and William Clarkson, Princeton University; William Paul, Wind River Systems; Joseph A. Calandri | Lest We Remember: Cold Boot Attacks on Encryption Keys | 17th USENIX Security Symposium Refereed Papers | |
55. | Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, and Haining Wang, The College of William and Mary | Measurement and Classification of Humans and Bots in Internet Chat | 17th USENIX Security Symposium Refereed Papers | |
56. | Darren Lacey, Chief Information Security Officer, Johns Hopkins University/Johns Hopkins Medicine | Managing Insecurity: Practitioner Reflections on Social Costs of Security | 17th USENIX Security Symposium Invited Talks | |
57. | Niels Provos, Google, Inc. | The Ghost in the Browser and Other Frightening Stories About Web Malware | 17th USENIX Security Symposium Invited Talks | |
58. | Thomas Ristenpart, University of California, San Diego; Gabriel Maganis, Arvind Krishnamurthy, and Tadayoshi Kohno, University of Washington | Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs | 17th USENIX Security Symposium Refereed Papers | |
59. | Jon Oberheide, Evan Cooke, and Farnam Jahanian, University of Michigan | CloudAV: N-Version Antivirus in the Network Cloud | 17th USENIX Security Symposium Refereed Papers | |
60. | Negar Kiyavash, Amir Houmansadr, and Nikita Borisov, University of Illinois at Urbana-Champaign | Multi-flow Attacks Against Network Flow Watermarking Schemes | 17th USENIX Security Symposium Refereed Papers | |