New York, NY, United States of America

Brian M Bowen


Average Co-Inventor Count = 6.5

ph-index = 4

Forward Citations = 267(Granted Patents)


Company Filing History:


Years Active: 2013-2018

Loading Chart...
4 patents (USPTO):

Title: Inventor Spotlight: Brian M. Bowen

Introduction

Brian M. Bowen, an accomplished inventor based in New York, NY, has significantly contributed to the field of cybersecurity through his innovative patents. With a total of four patents to his name, Bowen’s work focuses on advanced methods and systems for detecting covert malware and defending against insider threats.

Latest Patents

Bowen's latest patents showcase his expertise in the detection of covert malware within computing environments. His patent titled "Methods, systems, and media for detecting covert malware" outlines a comprehensive approach that involves receiving a set of user actions, generating a second set informed by user activity models, and evaluating application state information to identify the presence of malware.

Additionally, his patent "Methods, systems, and media for baiting inside attackers" demonstrates his innovative strategies in cybersecurity. This method revolves around creating decoy information based on real data, embedding beacons for monitoring, and establishing trap-based defenses to differentiate between decoy and actual information when accessed by potential attackers.

Career Highlights

Brian M. Bowen is currently affiliated with Columbia University, where he engages in research that fuels his inventive spirit and contributes to advancements in cybersecurity technologies.

Collaborations

Throughout his career, Bowen has collaborated with esteemed colleagues, including Salvatore J. Stolfo and Angelos D. Keromytis. These collaborations have enriched his work and fostered groundbreaking innovations in the security domain.

Conclusion

As a proactive inventor, Brian M. Bowen stands out for his commitment to developing innovative solutions in cybersecurity. His patents not only enhance the safety of computing environments but also represent his dedication to combating modern threats through inventive methodologies.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…