Scott Coull
Scott Coull
FireEye, Inc.
Bestätigte E-Mail-Adresse bei fireeye.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
2012 IEEE symposium on security and privacy, 332-346, 2012
3392012
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.
CV Wright, SE Coull, F Monrose
NDSS 9, 2009
3162009
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
CV Wright, L Ballard, SE Coull, F Monrose, GM Masson
2008 IEEE Symposium on Security and Privacy (sp 2008), 35-49, 2008
2632008
Intrusion detection: A bioinformatics approach
S Coull, J Branch, B Szymanski, E Breimer
Computer Security Applications Conference, 2003. Proceedings. 19th Annual, 24-33, 2003
1902003
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
SE Coull, CV Wright, F Monrose, MP Collins, MK Reiter
Ndss 7, 35-47, 2007
1352007
Protocol misidentification made easy with format-transforming encryption
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1152013
Sequence alignment for masquerade detection
SE Coull, BK Szymanski
Computational Statistics & Data Analysis 52 (8), 4116-4131, 2008
1082008
On Web Browsing Privacy in Anonymized NetFlows.
SE Coull, MP Collins, CV Wright, F Monrose, MK Reiter
USENIX Security Symposium, 339-352, 2007
972007
Controlling access to an oblivious database using stateful anonymous credentials
S Coull, M Green, S Hohenberger
International Workshop on Public Key Cryptography, 501-520, 2009
902009
Traffic analysis of encrypted messaging services: Apple imessage and beyond
SE Coull, KP Dyer
ACM SIGCOMM Computer Communication Review 44 (5), 5-11, 2014
602014
Taming the devil: Techniques for evaluating anonymized network data
SE Coull, CV Wright, AD Keromytis, F Monrose, MK Reiter
NDSS, 125-135, 2008
602008
Uncovering spoken phrases in encrypted voice over IP conversations
CV Wright, L Ballard, SE Coull, F Monrose, GM Masson
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-30, 2010
542010
Marionette: A programmable network traffic obfuscation system
KP Dyer, SE Coull, T Shrimpton
24th {USENIX} Security Symposium ({USENIX} Security 15), 367-382, 2015
502015
The challenges of effectively anonymizing network data
SE Coull, F Monrose, MK Reiter, M Bailey
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
452009
Exploring adversarial examples in malware detection
O Suciu, SE Coull, J Johns
2019 IEEE Security and Privacy Workshops (SPW), 8-14, 2019
422019
On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses.
SE Coull, F Monrose, M Bailey
NDSS, 2011
292011
Access controls for oblivious and anonymous systems
SE Coull, M Green, S Hohenberger
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-28, 2011
172011
Understanding domain registration abuses
SE Coull, AM White, TF Yen, F Monrose, MK Reiter
IFIP International Information Security Conference, 68-79, 2010
132010
On the development of an internetwork-centric defense for scanning worms
SE Coull, BK Szymanski
computers & security 28 (7), 637-647, 2009
122009
Format-Transforming Encryption: More than Meets the DPI.
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
IACR Cryptol. ePrint Arch. 2012, 494, 2012
112012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20