MediaWiki API result
This is the HTML representation of the JSON format. HTML is good for debugging, but is unsuitable for application use.
Specify the format parameter to change the output format. To see the non-HTML representation of the JSON format, set format=json.
See the complete documentation, or the API help for more information.
{
"batchcomplete": "",
"continue": {
"lecontinue": "20250303031254|7724",
"continue": "-||"
},
"query": {
"logevents": [
{
"logid": 7734,
"ns": 0,
"title": "EvoSec 2025W Lecture 21",
"pageid": 3586,
"logpage": 3586,
"revid": 25047,
"params": {},
"type": "create",
"action": "create",
"user": "Soma",
"timestamp": "2025-03-27T15:26:14Z",
"comment": "Created page with \"==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/burgess-nspw2018.pdf Burgess, \"After the BlockCloud Apocalypse.\" (NSPW 2018)] ==Discussion Questions== * Which predictions were the most plausible? implausible? * What relevant advancements/developments (technical or otherwise) were missed in the timeline that could change the envisioned trajectory? * What can we do to avoid a blockcloud apocalypse? ==Notes==\""
},
{
"logid": 7733,
"ns": 0,
"title": "EvoSec 2025W Lecture 20",
"pageid": 3585,
"logpage": 3585,
"revid": 25045,
"params": {},
"type": "create",
"action": "create",
"user": "Soma",
"timestamp": "2025-03-25T15:30:13Z",
"comment": "Created page with \"==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw97.pdf Somayaji, \"Principles of a Computer Immune System.\" (NSPW 1997)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/nspw-2007-biopanel.pdf Somayaji, \"Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn?\" (NSPW 2008)] ==Discussion Questions== * How does evolution relate to biologically-inspired security? * How does trust relate to biologically-inspired sec...\""
},
{
"logid": 7732,
"ns": 0,
"title": "EvoSec 2025W Lecture 19",
"pageid": 3584,
"logpage": 3584,
"revid": 25043,
"params": {},
"type": "create",
"action": "create",
"user": "Soma",
"timestamp": "2025-03-20T15:35:07Z",
"comment": "Created page with \"==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-ccsw2020.pdf Findlay, \"bpfbox: Simple Precise Process Confinement with eBPF.\" (CCSW 2020)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/findlay-bpfcontain2021.pdf Findlay, \"Bpfcontain: Fixing the soft underbelly of container security.\" (arXiv 2021)] ==Discussion Questions== * Is the complexity of Linux security mechanisms due more to functional requirements or evolutionary processes? * What is...\""
},
{
"logid": 7731,
"ns": 0,
"title": "EvoSec 2025W Lecture 18",
"pageid": 3583,
"logpage": 3583,
"revid": 25042,
"params": {},
"type": "create",
"action": "create",
"user": "Soma",
"timestamp": "2025-03-18T18:36:34Z",
"comment": "Created page with \"==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/dabbour-nspw2020.pdf Dabbour, \"Towards In-Band Non-Cryptographic Authentication.\" (NSPW 2020)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/bfoster-gecco-2010.pdf Foster, \"Object-Level Recombination of Commodity Applications.\" (GECCO 2010)] ==Notes== <pre> Lecture 18 ---------- G1 - can be more complex to detect imposters in practice because to do so because 1) you won't consider it a possibility, and...\""
},
{
"logid": 7730,
"ns": 0,
"title": "COMP3000 Operating Systems W25: Tutorial 9",
"pageid": 3582,
"logpage": 3582,
"revid": 25041,
"params": {},
"type": "create",
"action": "create",
"user": "Lianyingzhao",
"timestamp": "2025-03-15T15:17:16Z",
"comment": "Created page with \"By the end of this tutorial, you will have a basic familiarity with the Docker platform and be able to run, operate, and customize containers, and create simple containers of your own. You will see how kernel building blocks like namespaces make containers possible. ==General Instructions (same for all tutorials)== <div class=\"mw-collapsible mw-collapsed\"> Click on Expand to view. <div class=\"mw-collapsible-content\"> Tutorials are graded based on participation and effo...\""
},
{
"logid": 7729,
"ns": 0,
"title": "EvoSec 2025W Lecture 17",
"pageid": 3581,
"logpage": 3581,
"revid": 25037,
"params": {},
"type": "create",
"action": "create",
"user": "Soma",
"timestamp": "2025-03-13T14:25:39Z",
"comment": "Created page with \"==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/amatrawy-acns-05.pdf Matrawy, \"Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.\" (ACNS 2005)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/inoue-lisa2007.pdf Inoue, \"NetADHICT: A Tool for Understanding Network Traffic.\" (LISA 2007)] ==Discussion Questions== ==Notes==\""
},
{
"logid": 7728,
"ns": 0,
"title": "EvoSec 2025W Lecture 16",
"pageid": 3580,
"logpage": 3580,
"revid": 25035,
"params": {},
"type": "create",
"action": "create",
"user": "Soma",
"timestamp": "2025-03-11T15:31:29Z",
"comment": "Created page with \"==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/yli-acsac-05.pdf Li, \"Securing Email Archives through User Modeling.\" (ACSAC 2005)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/li-catx2013.pdf Li, \"Fine-grained Access Control using Email Social Networks.\" (CATX 2013)] ==Discussion Questions== Feel free to only address a subset or none of the following questions in your discussion! * What does it take to define \"normal\"? In what contexts is it easi...\""
},
{
"logid": 7727,
"ns": 0,
"title": "COMP3000 Operating Systems W25: Tutorial 8",
"pageid": 3579,
"logpage": 3579,
"revid": 25034,
"params": {},
"type": "create",
"action": "create",
"user": "Lianyingzhao",
"timestamp": "2025-03-07T06:01:04Z",
"comment": "Created page with \"In this tutorial, you\u2019ll be learning about how virtual addresses are mapped to physical addresses (the address translation) and continue to use kernel modules to extract information that only the kernel has access to. In particular, the kernel module performs a 5-level page table walk to find out the physical address corresponding to a userspace virtual address. In addition to what was discussed in the class, You can also read [https://en.wikipedia.org/wiki/Intel_5-lev...\""
},
{
"logid": 7726,
"ns": 0,
"title": "EvoSec 2025W Lecture 15",
"pageid": 3578,
"logpage": 3578,
"revid": 25032,
"params": {},
"type": "create",
"action": "create",
"user": "Soma",
"timestamp": "2025-03-06T16:23:49Z",
"comment": "Created page with \"==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-usec2017.pdf Obada-Obieh, \"\u201cDon\u2019t Break My Heart!\u201d: User Security Strategies for Online Dating.\" (USEC 2017)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/obada-nspw2017.pdf Obada-Obieh, \"Can I believe you?: Establishing Trust in Computer Mediated Introductions.\" (NSPW 2017)] ==Discussion Questions== * How different is dating from other introduction problems today? * How central is reputat...\""
},
{
"logid": 7725,
"ns": 0,
"title": "EvoSec 2025W Lecture 14",
"pageid": 3577,
"logpage": 3577,
"revid": 25030,
"params": {},
"type": "create",
"action": "create",
"user": "Soma",
"timestamp": "2025-03-04T16:32:37Z",
"comment": "Created page with \"==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/somayaji-nspw2013.pdf Somayaji, \"Towards Narrative Authentication: or, against boring authentication.\" (NSPW 2013)] ==Discussion Questions== * How quickly can you verify that another person knows the same story that you do? Can someone who doesn't know the story fool you easily? * Are there stories that are known to friends and family but that are not written down anywhere? * Could any social media or fina...\""
}
]
}
}