We explore the ways in which interfaces can be designed to deceive users so as to create the illusion of magic. We present a study of an experimental performance in which a magici...
A successful source-end DDoS defense enables early suppression of the attack and minimizes collateral damage. However, such an approach faces many challenges: (a) distributing the...
The DARPA Information Assurance Program has the aim of developing and executing experiments that test specific hypotheses about defense in depth and dynamic defense capabilities. ...
The GOODLY language can be used to specify the design of systems built according to the Object Oriented paradigm. It was conceived with the main purpose of facilitating the extrac...
Fernando Brito e Abreu, Luis Ochoa, Miguel Goul&at...
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...