Scott Coull
TitleCited byYear
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
2012 IEEE symposium on security and privacy, 332-346, 2012
3002012
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.
CV Wright, SE Coull, F Monrose
NDSS 9, 2009
2892009
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
CV Wright, L Ballard, SE Coull, F Monrose, GM Masson
2008 IEEE Symposium on Security and Privacy (sp 2008), 35-49, 2008
2512008
Intrusion detection: A bioinformatics approach
S Coull, J Branch, B Szymanski, E Breimer
Computer Security Applications Conference, 2003. Proceedings. 19th Annual, 24-33, 2003
1882003
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
SE Coull, CV Wright, F Monrose, MP Collins, MK Reiter
Ndss 7, 35-47, 2007
1292007
Protocol misidentification made easy with format-transforming encryption
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1052013
Sequence alignment for masquerade detection
SE Coull, BK Szymanski
Computational Statistics & Data Analysis 52 (8), 4116-4131, 2008
1052008
On Web Browsing Privacy in Anonymized NetFlows.
SE Coull, MP Collins, CV Wright, F Monrose, MK Reiter
USENIX Security Symposium, 339-352, 2007
952007
Controlling access to an oblivious database using stateful anonymous credentials
S Coull, M Green, S Hohenberger
International Workshop on Public Key Cryptography, 501-520, 2009
852009
Taming the devil: Techniques for evaluating anonymized network data
SE Coull, CV Wright, AD Keromytis, F Monrose, MK Reiter
582008
Traffic analysis of encrypted messaging services: Apple imessage and beyond
SE Coull, KP Dyer
ACM SIGCOMM Computer Communication Review 44 (5), 5-11, 2014
502014
Uncovering spoken phrases in encrypted voice over IP conversations
CV Wright, L Ballard, SE Coull, F Monrose, GM Masson
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-30, 2010
472010
The challenges of effectively anonymizing network data
SE Coull, F Monrose, MK Reiter, M Bailey
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
452009
Marionette: A programmable network traffic obfuscation system
KP Dyer, SE Coull, T Shrimpton
24th {USENIX} Security Symposium ({USENIX} Security 15), 367-382, 2015
412015
On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses.
SE Coull, F Monrose, M Bailey
NDSS, 2011
272011
Access controls for oblivious and anonymous systems
SE Coull, M Green, S Hohenberger
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-28, 2011
162011
Exploring adversarial examples in malware detection
O Suciu, SE Coull, J Johns
2019 IEEE Security and Privacy Workshops (SPW), 8-14, 2019
152019
Understanding domain registration abuses
SE Coull, AM White, TF Yen, F Monrose, MK Reiter
IFIP International Information Security Conference, 68-79, 2010
122010
Bounded vector signatures and their applications
L Wei, SE Coull, MK Reiter
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
102011
On the development of an internetwork-centric defense for scanning worms
SE Coull, BK Szymanski
computers & security 28 (7), 637-647, 2009
102009
The system can't perform the operation now. Try again later.
Articles 1–20