1. Baiting Inside Attackers Using Decoy Documents Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
2. Designing Host and Network Sensors to Mitigate the Insider Threat Bowen, Brian M.; Ben Salem, Malek; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
3. Automating the Injection of Believable Decoys to Detect Snooping Bowen, Brian M.; Kemerlis, Vasileios; Rabhu, Pratap; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
4. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
5. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Reports Computer science