Brian M. Bowen research | publications | miscellaneous
 
Peer-Reviewed Journal Publications
1.
A System for Generating and Injecting Indistinguishable Network Decoys
Brian M. Bowen, Vasileios P. Kemerlis, Pratap Prabhu, Angelos D. Keromytis, and Salvatore J. Stolfo. To appear in the Journal of Computer Security (JCS).
 
2.
Designing Host and Network Sensors to Mitigate the Insider Threat
Brian M. Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, and Salvatore J. Stolfo. In IEEE Security & Privacy Magazine, vol. 7, no. 6, pp. 22 - 29, November/December 2009.
 
 
Peer-Reviewed Conference Proceedings
1.
Measuring the Human Factor of Cyber Security
Brian M. Bowen, Ram Devarajan, Sal Stolfo. To appear in the Eleventh Annual IEEE Conference on Technologies for Homeland Security (HST 11), November 15-17, 2011, MA.
 
2.
Short Paper: Crimeware Swindling without Virtual Machines
Vasilis Pappas, Brian M. Bowen, and Angelos D. Keromytis. To appear in the Proceedings of the 13th Information Security Conference (ISC). October 2010, Boca Raton, FL. (Acceptance rate: 27.6%)
 
3.
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
Brian M. Bowen, Pratap Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, and Salvatore J. Stolfo. To appear in Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID). September 2010, Ottawa, Canada.
 
4.
Automating the Injection of Believable Decoys to Detect Snooping (Short Paper)
Brian M. Bowen, Vasilis Kemerlis, Pratap Prabhu, Angelos D. Keromytis, and Salvatore J. Stolfo. Proceedings of the 3rd ACM Conference on Wireless Network Security (WiSec), pp. 81-86, March 2010, Hoboken, NJ. (Acceptance rate: 21%)
[ Video Demo ]
 
5.
Baiting Inside Attackers Using Decoy Documents
Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, and Salvatore J. Stolfo. In Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm). September 2009, Athens, Greece. (Acceptance rate: 25.3%)
 
6.
Fast Digital Image Inpainting
Manuel M. Oliveira, Brian M. Bowen, Richard McKenna, Yu-Sung Chang. In Proceedings of the International Conference on Visualization, Imaging, and Image Processing (VIIP), pp. 261- 266, 2001, Marbella, Spain.
 
 
Workshops
1.
Host and Network Sensors
Malek Ben Salem and Brian M. Bowen. Institute for Information Infrastructure Protection (I3P) Insider Threat workshop, May 2009, Washington D.C.
 
 
Books
1.
Insider Threat Defense
Salvatore J. Stolfo, Brian M. Bowen, and Malek Ben Salem and. In Encyclopedia of Cryptography and Security (2nd Ed.), Springer. (To appear 2010)
 
2.
Designing Host and Network Sensors to Mitigate the Insider Threat
Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, and Salvatore J. Stolfo. "Monitoring Technologies for Mitigating Insider Threats" in Insider Threats in Cyber Security and Beyond, Springer Publishing Company, In Print, pp. 197-218.
 
 
Patent Applications
1.
Methods, Systems, and Media for Baiting Inside Attackers
Angelos D. Keromytis, Salvatore J. Stolfo, Brian M. Bowen, Shlomo Hershkop, Vasileios P. Kemerlis, Pratap V. Prabhu, Malek Ben Salem, U.S. Patent Number 20100077483, Published March 25th 2010.
 
 
Posters
1.
Designing Host and Network Sensors to Mitigate the Insider Threat
Malek Ben Salem, Brian M. Bowen, Angelos D. Keromytis and Salvatore J. Stolfo. Poster at the 25th Annual Computer Security Applications Conference, Honolulu, HI, December 2009.
 
 
Technical Reports
1.
Designing Host and Network Sensors to Mitigate the Insider Threat
Brian M. Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, and Salvatore J. Stolfo. In IEEE Security & Privacy Magazine, vol. 7, no. 6, pp. 22 - 29, November/December 2009.