1. Design and Analysis of Decoy Systems for Computer Security Bowen, Brian M. 2011 Theses Computer scienceOperating systems (Computers)--Security measuresMalware (Computer software)Cyber intelligence (Computer security)
2. Measuring the Human Factor of Cyber Security Bowen, Brian M.; Devarajan, Ramaswamy; Stolfo, Salvatore 2011 Articles Computer science
3. Automating the Injection of Believable Decoys to Detect Snooping Bowen, Brian M.; Kemerlis, Vasileios; Rabhu, Pratap; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
4. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
5. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Reports Computer science
6. Crimeware Swindling without Virtual Machines Pappas, Vasileios; Bowen, Brian M.; Keromytis, Angelos D. 2010 Articles Computer science
7. Evaluation of a Spyware Detection System Using Thin Client Computing Pappas, Vasileios; Bowen, Brian M.; Keromytis, Angelos D. 2010 Articles Computer science
8. Baiting Inside Attackers Using Decoy Documents Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
9. Designing Host and Network Sensors to Mitigate the Insider Threat Bowen, Brian M.; Ben Salem, Malek; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science