ID | Interpret | Skladba | Album | |
1. | Atomine Elektrine | Plasmoid Detection | Nebulous | |
2. | MU News Bureau | 12.16.05 Traffic Detection | Spotlight on Science | |
3. | MU News Bureau | 03.03.06 Cell Detection | Spotlight on Science | |
4. | Edited by Douglas G. Greene | Detection by Gaslight | | |
5. | KyoungSoo Park, Vivek S. Pai | Securing Web Service by Automatic Robot Detection | USENIX '06 Annual Technical Conferecne | |
6. | SearchSecurity.com and Addison Wesley | Extrusion Detection: Defensible Network Architecture | | |
7. | Charles Lee and Frank Ling | Tsunami Detection -- Berkeley Groks 2006-09-27 | Berkeley Groks Science Radio Show | |
8. | Leo Laporte with Bill Handel | TLR 12: Leo on KFI with Bill Handel - Lexus Face Detection | TLR May 2007 | |
9. | Computerworld/Ian Lamont | Computerworld TechCast: Intrusion Detection and Prevention Systems | | |
10. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages - Q&A | USENIX Security Symposium 2006 | |
11. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages | USENIX Security Symposium 2006 | |
12. | Amy Shojai | Pet Peeves Episode 49 The Big Bang Theory? ATF Explosives Detection Dogs | PetLifeRadio.com - Let's Talk Pets on Pet Life Radio | |
13. | Yale Cancer Center | Healthline September 24 - Detection and Treatment of Early Stage Prostate Cancer | Healthline Cancer Info | |
14. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
15. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
16. | Damiano Bolzoni | ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Sytems | 21st Large Installation System Administration Conference Refereed Papers | |
17. | Damiano Bolzoni | ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Sytems | 21st Large Installation System Administration Conference Refereed Papers | |
18. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
19. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
20. | Guofei Gu, Georgia Institute of Technology; Roberto Perdisci, Damballa, Inc.; Junjie Zhang and Wenke Lee, Georgia Institute of Technology | BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | 17th USENIX Security Symposium Refereed Papers | |
21. | Tumblon.com - Helen Hayden-Wade, Ph.D. | Helen Hayden-Wade, Ph.D., discussing the importance of early detection of potential problems in children | Tumblon.com | |
22. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |