|
|
Peer-Reviewed Journal Publications |
1. |
|
A System for Generating and Injecting Indistinguishable Network Decoys |
|
Brian M. Bowen, Vasileios P. Kemerlis, Pratap Prabhu, Angelos D. Keromytis, and Salvatore J. Stolfo. To appear in the Journal of Computer Security (JCS). |
|
2. |
|
Designing Host and Network Sensors to Mitigate the Insider Threat |
|
Brian M. Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, and Salvatore J. Stolfo. In IEEE Security & Privacy Magazine, vol. 7, no. 6, pp. 22 - 29, November/December 2009. |
|
|
|
Peer-Reviewed Conference Proceedings |
1. |
|
Measuring the Human Factor of Cyber Security |
|
Brian M. Bowen, Ram Devarajan, Sal Stolfo. To appear in the Eleventh Annual IEEE Conference on Technologies for Homeland Security (HST 11), November 15-17, 2011, MA. |
|
|
2. |
|
Short Paper: Crimeware Swindling without Virtual Machines |
|
Vasilis Pappas, Brian M. Bowen, and Angelos D. Keromytis. To appear in the Proceedings of the 13th Information Security Conference (ISC). October 2010, Boca Raton, FL. (Acceptance rate: 27.6%) |
|
|
3. |
|
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection |
|
Brian M. Bowen, Pratap Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, and Salvatore J. Stolfo. To appear in Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID). September 2010, Ottawa, Canada. |
|
|
4. |
|
Automating the Injection of Believable Decoys to Detect Snooping (Short Paper) |
|
Brian M. Bowen, Vasilis Kemerlis, Pratap Prabhu, Angelos D. Keromytis, and Salvatore J. Stolfo. Proceedings of the 3rd ACM Conference on Wireless Network Security (WiSec), pp. 81-86, March 2010, Hoboken, NJ. (Acceptance rate: 21%) [ Video Demo ] |
|
|
5. |
|
Baiting Inside Attackers Using Decoy Documents |
|
Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, and Salvatore J. Stolfo. In Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm). September 2009, Athens, Greece. (Acceptance rate: 25.3%) |
|
6. |
|
Fast Digital Image Inpainting |
|
Manuel M. Oliveira, Brian M. Bowen, Richard McKenna, Yu-Sung Chang. In Proceedings of the International Conference on Visualization, Imaging, and Image Processing (VIIP), pp. 261- 266, 2001, Marbella, Spain. |
|
|
|
Workshops |
1. |
|
Host and Network Sensors |
|
Malek Ben Salem and Brian M. Bowen. Institute for Information Infrastructure Protection (I3P) Insider Threat workshop, May 2009, Washington D.C. |
|
|
|
Books |
1. |
|
Insider Threat Defense |
|
Salvatore J. Stolfo, Brian M. Bowen, and Malek Ben Salem and. In Encyclopedia of Cryptography and Security (2nd Ed.), Springer. (To appear 2010) |
|
2. |
|
Designing Host and Network Sensors to Mitigate the Insider Threat |
|
Brian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, and Salvatore J. Stolfo. "Monitoring Technologies for Mitigating Insider Threats" in Insider Threats in Cyber Security and Beyond, Springer Publishing Company, In Print, pp. 197-218. |
|
|
|
Patent Applications |
1. |
|
Methods, Systems, and Media for Baiting Inside Attackers |
|
Angelos D. Keromytis, Salvatore J. Stolfo, Brian M. Bowen, Shlomo Hershkop, Vasileios P. Kemerlis, Pratap V. Prabhu, Malek Ben Salem, U.S. Patent Number 20100077483, Published March 25th 2010. |
|
|
|
Posters |
1. |
|
Designing Host and Network Sensors to Mitigate the Insider Threat |
|
Malek Ben Salem, Brian M. Bowen, Angelos D. Keromytis and Salvatore J. Stolfo. Poster at the 25th Annual Computer Security Applications Conference, Honolulu, HI, December 2009. |
|
|
|
Technical Reports |
1. |
|
Designing Host and Network Sensors to Mitigate the Insider Threat |
|
Brian M. Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, and Salvatore J. Stolfo. In IEEE Security & Privacy Magazine, vol. 7, no. 6, pp. 22 - 29, November/December 2009. |
|
|