Abstract is missing.
- WCIS: A Prototype for Detecting Zero-Day Attacks in Web Server RequestsMelissa Danforth. [doi]
- Debugging Makefiles with remakeRocky Bernstein. [doi]
- Community-based Analysis of Netflow for Early Detection of Security IncidentsStefan Weigert, Matti A. Hiltunen, Christof Fetzer. [doi]
- Bringing Up Cielo: Experiences with a Cray XE6 System, or, Getting Started with Your New 140k Processor System (Practice & Experience Report)Cory Lueninghoener, Daryl Grunau, Timothy Harrington, Kathleen Kelly, Quellyn Snead. [doi]
- A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large NetworksDamiano Bolzoni, Christiaan Schade, Sandro Etalle. [doi]
- Experiences with BOWL: Managing an Outdoor WiFi Network (or How to Keep Both Internet Users and Researchers Happy?) (Practice & Experience Report)Thorsten Fischer, Thomas Hühn, Robin Kuck, Ruben Merz, Julius Schulz-Zander, Cigdem Sengul. [doi]
- Automated Planning for Configuration ChangesHerry Herry, Paul Anderson, Gerhard Wickler. [doi]
- Deploying IPv6 in the Google Enterprise Network: Lessons Learned (Practice & Experience Report)Haythum Babiker, Irena Nikolova, Kiran Kumar Chittimaneni. [doi]
- Improving Virtual Appliance Management through Virtual Layered File SystemsShaya Potter, Jason Nieh. [doi]
- Fine-grained Access-control for the Puppet Configuration LanguageBart Vanbrabant, Joris Peeraer, Wouter Joosen. [doi]
- Sequencer: Smart Control of Hardware and Software Components in Clusters (and Beyond)Pierre Vignéras. [doi]
- Using Active Intrusion Detection to Recover Network TrustJohn F. Williamson, Sergey Bratus, Michael E. Locasto. [doi]
- Building Useful Security Infrastructure for Free (Practice & Experience Report)Brad Lhotsky. [doi]
- Capacity Forecasting in a Backup Storage Environment (Practice & Experience Report)Mark Chamness. [doi]
- Auto-learning of SMTP TCP Transport-Layer Features for Spam and Abusive Message DetectionGeorgios Kakavelakis, Joel Young. [doi]
- Tiqr: A Novel Take on Two-Factor AuthenticationRoland M. van Rijswijk, Joost van Dijk. [doi]
- DarkNOC: Dashboard for Honeypot ManagementBertrand Sobesto, Michel Cukier, Matti A. Hiltunen, Dave Kormann, Gregg Vesonder, Robin Berthier. [doi]
- Scaling on EC2 in a Fast-Paced Environment (Practice & Experience Report)Nicolas Brousse. [doi]
- Getting to Elastic: Adapting a Legacy Vertical Application Environment for ScalabilityEric Shamow. [doi]
- Local System Security via SSHD InstrumentationScott Campbell. [doi]
- Adventures in (Small) Datacenter Migration (Practice & Experience Report)Jon Kuroda, Jeff Anderson-Lee, Albert Goto, Scott McNally. [doi]
- Provenance for System TroubleshootingMarc Chiarini. [doi]
- Content-aware Load Balancing for Distributed BackupFred Douglis, Deepti Bhardwaj, Hangwei Qian, Philip Shilane. [doi]
- CDE: Run Any Linux Application On-Demand Without InstallationPhilip J. Guo. [doi]
- Why Do Migrations Fail and What Can We Do about It?Gong Zhang, Ling Liu. [doi]
- Automating Network and Service Configuration Using NETCONF and YANGStefan Wallin, Claes Wikström. [doi]
- Staging Package Deployment via Repository ManagementChris St. Pierre, Matt Hermanson. [doi]