Scott E. Coull, Ph.D.
Affiliations: | 2009 | Johns Hopkins University, Baltimore, MD |
Area:
Computer ScienceGoogle:
"Scott Coull"Parents
Sign in to add mentorFabian Monrose | grad student | 2009 | Johns Hopkins | |
(Methods for evaluating the privacy of anonymized network data.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Coull SE, White AM, Yen TF, et al. (2012) Understanding domain registration abuses Computers and Security. 31: 806-815 |
Coull SE, Green M, Hohenberger S. (2011) Access controls for oblivious and anonymous systems Acm Transactions On Information and System Security. 14 |
Wright CV, Ballard L, Coull SE, et al. (2010) Uncovering spoken phrases in encrypted Voice over IP conversations Acm Transactions On Information and System Security. 13 |
Coull SE, Monrose F, Reiter MK, et al. (2009) The challenges of effectively anonymizing network data Proceedings - Cybersecurity Applications and Technology Conference For Homeland Security, Catch 2009. 230-236 |
Wright CV, Ballard L, Coull SE, et al. (2008) Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations Proceedings - Ieee Symposium On Security and Privacy. 35-49 |
Coull SE, Szymanski BK. (2008) Sequence alignment for masquerade detection Computational Statistics and Data Analysis. 52: 4116-4131 |
Coull SE, Szymanski BK. (2007) On the development of an internetwork-centric defense for scanning worms Proceedings of the Annual Hawaii International Conference On System Sciences |