We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
We report on a year-long qualitative and ethnographic project to examine the value of digital pen technology for note taking. A digital pen captures a facsimile of information wri...
Christopher N. Chapman, Michal Lahav, Susan Burges...
Considered as enablers of seamless application-toapplication integration both within company boundaries and on a global scale, Web Services-based SOAs have traditionally focused o...
The assessment and mitigation of risks related to the availability of the IT infrastructure is becoming increasingly important in modern organizations. Unfortunately, present stan...