Brian M. Bowen

According to our database1, Brian M. Bowen authored at least 9 papers between 2009 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2012
A system for generating and injecting indistinguishable network decoys.
Journal of Computer Security, 2012

2011
Insider Threat Defense.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
Monitoring Technologies for Mitigating Insider Threats.
Proceedings of the Insider Threats in Cyber Security, 2010

Automating the injection of believable decoys to detect snooping.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Crimeware Swindling without Virtual Machines.
Proceedings of the Information Security - 13th International Conference, 2010

Evaluation of a Spyware Detection System Using Thin Client Computing.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

2009
Designing Host and Network Sensors to Mitigate the Insider Threat.
IEEE Security & Privacy, 2009

Baiting Inside Attackers Using Decoy Documents.
Proceedings of the Security and Privacy in Communication Networks, 2009


  Loading...