Search dblp for Publications

export results for "toc:db/journals/usenix-login/usenix-login27.bht:"

 download as .bib file

@article{DBLP:journals/usenix-login/Allison02,
  author       = {Jared Allison},
  title        = {Automated Log Procesing},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {6},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/automated-log-procesing},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Allison02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Arkin02,
  author       = {Ofir Arkin},
  title        = {A Remote Active {OS} Fingerprinting Tool Using {ICMP}},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {2},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/remote-active-os-fingerprinting-tool-using-icmp},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Arkin02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Arkin02a,
  author       = {Ofir Arkin},
  title        = {Security Threats to {IP} Telephony-Based Networks},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {6},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/security-threats-ip-telephony-based-networks},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Arkin02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Ashizawa02,
  author       = {Neil Ashizawa},
  title        = {Monitoring Strategies for High-Availability Web Apps},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/monitoring-strategies-high-availability-web-apps},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Ashizawa02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Carlini02,
  author       = {James Carlini},
  title        = {Cabling: Just the Tip of the Iceberg},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {5},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/cabling-just-tip-iceberg},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Carlini02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Chalup02,
  author       = {Strata R. Chalup},
  title        = {Consulting Reflections},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {1},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/consulting-reflections},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Chalup02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Chalup02a,
  author       = {Strata R. Chalup},
  title        = {Wiki, Blog, Zope, and Other Communicative Grunts},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {2},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/wiki-blog-zope-and-other-communicative-grunts},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Chalup02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Chalup02b,
  author       = {Strata R. Chalup},
  title        = {Uncle Sam as Uncle Spam},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {3},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/uncle-sam-uncle-spam},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Chalup02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Chalup02c,
  author       = {Strata R. Chalup},
  title        = {Vive la R{\'{e}}volution! Now Get Over It!},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {5},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/vive-la-r\%C3\%A9volution-now-get-over-it},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Chalup02c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Cohen02,
  author       = {Gary Cohen},
  title        = {Securing {FTP}},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/securing-ftp},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Cohen02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Danielyan02,
  author       = {Edgar Danielyan},
  title        = {The Law Moves In},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {1},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/law-moves},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Danielyan02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Darmohray02,
  author       = {Tina Darmohray},
  title        = {Apropos},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {1},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/apropos},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Darmohray02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Darmohray02a,
  author       = {Tina Darmohray},
  title        = {Apropos},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {3},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/apropos},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Darmohray02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Darmohray02b,
  author       = {Tina Darmohray},
  title        = {Apropos},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/apropos},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Darmohray02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Darmohray02c,
  author       = {Tina Darmohray},
  title        = {Apropos},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {5},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/apropos},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Darmohray02c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/DarmohrayK02,
  author       = {Tina Darmohray and
                  Rob Kolstad},
  title        = {Point/Counterpoint},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {2},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/pointcounterpoint},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/DarmohrayK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Dietrich02,
  author       = {Sven Dietrich},
  title        = {Active Network Defense: Some Concepts and Techniques},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {6},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/active-network-defense-some-concepts-and},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Dietrich02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Farrow02,
  author       = {Rik Farrow},
  title        = {Musings},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {1},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/musings},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Farrow02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Farrow02a,
  author       = {Rik Farrow},
  title        = {Musings},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {2},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/musings},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Farrow02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Farrow02b,
  author       = {Rik Farrow},
  title        = {Musings},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {3},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/musings},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Farrow02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Farrow02c,
  author       = {Rik Farrow},
  title        = {Musings},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/musings},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Farrow02c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Farrow02d,
  author       = {Rik Farrow},
  title        = {Musings, Or What {I} Did on My Summer Vacation},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {5},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/musings-or-what-i-did-my-summer-vacation},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Farrow02d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Farrow02e,
  author       = {Rik Farrow},
  title        = {In This Issue},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {6},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/issue},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Farrow02e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Flynt02,
  author       = {Clif Flynt},
  title        = {Letters to the Editors},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {1},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/letters-editors},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Flynt02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Flynt02a,
  author       = {Clif Flynt},
  title        = {The Tclsh Spot},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {2},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/tclsh-spot},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Flynt02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Flynt02b,
  author       = {Clif Flynt},
  title        = {The Tclsh Spot},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {3},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/tclsh-spot},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Flynt02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Flynt02c,
  author       = {Clif Flynt},
  title        = {The Tclsh Spot},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/tclsh-spot},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Flynt02c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Flynt02d,
  author       = {Clif Flynt},
  title        = {Generating Ethernet Packets},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {5},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/generating-ethernet-packets},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Flynt02d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Foust02,
  author       = {Robert Foust},
  title        = {Identifying and Tracking Unauthorized 802.11 Cards and Access Points},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/identifying-and-tracking-unauthorized-80211-cards},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Foust02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/FuKM02,
  author       = {Kevin Fu and
                  Michael Kaminsky and
                  David Mazi{\`{e}}res},
  title        = {Using {SFS} for a Secure Network File System},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {6},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/using-sfs-secure-network-file-system},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/FuKM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Harris02,
  author       = {Trey Harris},
  title        = {Ask Mr. Know-It-All},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {1},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/ask-mr-know-it-all},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Harris02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Haskins02,
  author       = {Robert Haskins},
  title        = {ISPAdmin},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {2},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/ispadmin},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Haskins02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Haskins02a,
  author       = {Robert Haskins},
  title        = {ISPAdmin},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {3},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/ispadmin},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Haskins02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Haskins02b,
  author       = {Robert Haskins},
  title        = {ISPAdmin},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/ispadmin},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Haskins02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Haskins02c,
  author       = {Robert Haskins},
  title        = {ISPAdmin},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {5},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/ispadmin},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Haskins02c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Hobbit02,
  author       = {Hobbit},
  title        = {High Availability},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/high-availability},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Hobbit02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Hope02,
  author       = {Paco Hope},
  title        = {Using Jails in FreeBSD for Fun and Profit},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {3},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/using-jails-freebsd-fun-and-profit},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Hope02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/JohnsonW02,
  author       = {Steve Johnson and
                  Dusty White},
  title        = {Judgment},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {1},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/judgment},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/JohnsonW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Jones02,
  author       = {George M. Jones},
  title        = {The Case for Network Infrastructure Security},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {6},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/case-network-infrastructure-security},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Jones02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Josey02,
  author       = {Andrew Josey},
  title        = {Report received August 2002},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {5},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/report-received-august-2002},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Josey02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Kenneally02,
  author       = {Erin Kenneally},
  title        = {Evolving Behavioral Boundaries in Cyberspace},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {3},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/evolving-behavioral-boundaries-cyberspace},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Kenneally02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Kenneally02a,
  author       = {Erin Kenneally},
  title        = {Computer Forensics},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/computer-forensics},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Kenneally02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Kenneally02b,
  author       = {Erin Kenneally},
  title        = {"It Depends": Defining Legal Values for Network Behavior},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {6},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/it-depends-defining-legal-values-network},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Kenneally02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Kolstad02,
  author       = {Rob Kolstad},
  title        = {{MOTD}},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {1},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/motd},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Kolstad02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Kolstad02a,
  author       = {Rob Kolstad},
  title        = {Conference on File and Storage Technologies {(FAST} '02)},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {2},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/conference-file-and-storage-technologies-fast-02},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Kolstad02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Kolstad02b,
  author       = {Rob Kolstad},
  title        = {{MOTD}},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {3},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/motd},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Kolstad02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Kolstad02c,
  author       = {Rob Kolstad},
  title        = {{MOTD}},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/motd},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Kolstad02c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Kolstad02d,
  author       = {Rob Kolstad},
  title        = {{MOTD}},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {5},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/motd},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Kolstad02d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Kolstad02e,
  author       = {Rob Kolstad},
  title        = {{MOTD}},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {6},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/motd},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Kolstad02e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/McCluskey02,
  author       = {Glen McCluskey},
  title        = {New Preprocessor Features in {C9X}},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {1},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/new-preprocessor-features-c9x},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/McCluskey02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/McCluskey02a,
  author       = {Glen McCluskey},
  title        = {Math Library Functions in {C9X}},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {2},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/math-library-functions-c9x},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/McCluskey02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/McCluskey02b,
  author       = {Glen McCluskey},
  title        = {New {I/O} Features in {C9X}},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {3},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/new-io-features-c9x},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/McCluskey02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/McCluskey02c,
  author       = {Glen McCluskey},
  title        = {Wide Characters},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/wide-characters},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/McCluskey02c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/McCluskey02d,
  author       = {Glen McCluskey},
  title        = {{C99} and Compatability},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {5},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/c99-and-compatability},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/McCluskey02d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Moen02,
  author       = {Rick Moen},
  title        = {A Recipe for a Successful Linux User Group},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {2},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/recipe-successful-linux-user-group},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Moen02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Nicholson02,
  author       = {John Nicholson},
  title        = {Data Privacy},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {2},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/data-privacy},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Nicholson02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Nicholson02a,
  author       = {John Nicholson},
  title        = {Software Licensing 101},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {5},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/software-licensing-101},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Nicholson02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Owen02,
  author       = {Howard Owen},
  title        = {The Problem of {PORCMOLSULB}},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/problem-porcmolsulb},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Owen02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Patterson02,
  author       = {David A. Patterson},
  title        = {An Introduction to Dependability},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/introduction-dependability},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Patterson02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Perrine02,
  author       = {Tom Perrine},
  title        = {The Kernelized Secure Operating System {(KSOS)}},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {6},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/kernelized-secure-operating-system-ksos},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Perrine02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Russo02,
  author       = {Christopher M. Russo},
  title        = {What is Your Problem? That Email Was Fine!},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {1},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/what-your-problem-email-was-fine},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Russo02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Salus02,
  author       = {Peter H. Salus},
  title        = {The Bookworm},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {1},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/bookworm},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Salus02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Salus02a,
  author       = {Peter H. Salus},
  title        = {Secure from What?},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {6},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/secure-what},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Salus02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/SalusC02,
  author       = {Peter H. Salus and
                  Anton Chuvakin},
  title        = {Incident Response, and of Lance Spitzner: Honeypots: Tracking Hackers,
                  reviewed by Eugene Schultz and Russell Shumway},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {5},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/bookworm},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/SalusC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/SalusK02,
  author       = {Peter H. Salus and
                  Nina Karhuluoma},
  title        = {Have You Locked the Castle Gates? reviewed by Chuck Hardin, and of
                  John Viega and Gary McGraw: Building Secure Software},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/bookworm},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/SalusK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/SalusS02,
  author       = {Peter H. Salus and
                  Raymond M. Schneider},
  title        = {The Bookworm / "Agile Software Development" by Alistair Cockburn},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {2},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/bookworm},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/SalusS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/SalusS02a,
  author       = {Peter H. Salus and
                  Raymond M. Schneider},
  title        = {Dave Sill: The qmail Handbook reviewed by Dustin Puryear, and of Yukihiro
                  Matsumoto w/translated text by David L. Reynolds: Ruby in a Nutshell},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {6},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/bookworm},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/SalusS02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Sellens02,
  author       = {John Sellens},
  title        = {Ten Reasons to Monitor Your System},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/ten-reasons-monitor-your-system},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Sellens02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Singer02,
  author       = {Abe Singer},
  title        = {The Regional Information Watch},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {6},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/regional-information-watch},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Singer02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Sitaker02,
  author       = {Kragen Sitaker},
  title        = {Python or Perl: Which is Better?},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {3},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/python-or-perl-which-better},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Sitaker02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Skvarcek02,
  author       = {Jozef Skvarcek},
  title        = {Remote Monitoring with {SNMP}},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {5},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/remote-monitoring-snmp},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Skvarcek02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Spitzner02,
  author       = {Lance Spitzner},
  title        = {{HOSUS} (Honeypot Surveillance System)},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {6},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/hosus-honeypot-surveillance-system},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Spitzner02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Swartz02,
  author       = {Ray Swartz},
  title        = {When Do You Plan to Retire?},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {1},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/when-do-you-plan-retire},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Swartz02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Swartz02a,
  author       = {Ray Swartz},
  title        = {Planning a Model Retirement},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {2},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/planning-model-retirement},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Swartz02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Turoff02,
  author       = {Adam Turoff},
  title        = {Practical Perl},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {3},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/practical-perl},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Turoff02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Turoff02a,
  author       = {Adam Turoff},
  title        = {Practical Perl},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/practical-perl},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Turoff02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Turoff02b,
  author       = {Adam Turoff},
  title        = {Practical Perl},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {5},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/practical-perl},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Turoff02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Tylock02,
  author       = {Steven M. Tylock},
  title        = {{GVSAGE} Visits the Local Technology Show},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {1},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/gvsage-visits-local-technology-show},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Tylock02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Tylock02a,
  author       = {Steven M. Tylock},
  title        = {If Computers Had Blood, We'd Be Called Doctors, Part 2},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {1},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/if-computers-had-blood-wed-be-called-doctors},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Tylock02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Tylock02b,
  author       = {Steven M. Tylock},
  title        = {If Systems Were Cars, Would Yours Be Doubled Parked?},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/if-systems-were-cars-would-yours-be-doubled-parked},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Tylock02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Tylock02c,
  author       = {Steven M. Tylock},
  title        = {The SysAdmin's Court: Liz Action vs. Jack Trades},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/sysadmins-court-liz-action-vs-jack-trades},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Tylock02c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Wolf02,
  author       = {Gunnar E. Wolf},
  title        = {ProtoWrap},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {3},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/protowrap},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Wolf02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Wool02,
  author       = {Avishai Wool},
  title        = {Combating the Perils of Port 80 at the Firewall},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/combating-perils-port-80-firewall},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Wool02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics