Sciweavers

325 search results - page 3 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
CHI
2010
ACM
14 years 2 months ago
Deception and magic in collaborative interaction
We explore the ways in which interfaces can be designed to deceive users so as to create the illusion of magic. We present a study of an experimental performance in which a magici...
Joe Marshall, Steve Benford, Tony P. Pridmore
NCA
2003
IEEE
14 years 24 days ago
Source-End DDoS Defense
A successful source-end DDoS defense enables early suppression of the attack and minimizes collateral damage. However, such an approach faces many challenges: (a) distributing the...
Jelena Mirkovic, Gregory Prier, Peter L. Reiher
ACSAC
2000
IEEE
13 years 12 months ago
Layering Boundary Protections: An Experiment in Information Assurance
The DARPA Information Assurance Program has the aim of developing and executing experiments that test specific hypotheses about defense in depth and dynamic defense capabilities. ...
D. Johnson, L. Benzinger
ECOOPW
1999
Springer
13 years 11 months ago
The GOODLY Design Language for MOOD2 Metrics Collection
The GOODLY language can be used to specify the design of systems built according to the Object Oriented paradigm. It was conceived with the main purpose of facilitating the extrac...
Fernando Brito e Abreu, Luis Ochoa, Miguel Goul&at...
WWW
2008
ACM
14 years 8 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang