Scott E. Coull, Ph.D. - Publications

Affiliations: 
2009 Johns Hopkins University, Baltimore, MD 
Area:
Computer Science

7 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2012 Coull SE, White AM, Yen TF, Monrose F, Reiter MK. Understanding domain registration abuses Computers and Security. 31: 806-815. DOI: 10.1016/J.Cose.2012.05.005  0.539
2011 Coull SE, Green M, Hohenberger S. Access controls for oblivious and anonymous systems Acm Transactions On Information and System Security. 14. DOI: 10.1145/1952982.1952992  0.337
2010 Wright CV, Ballard L, Coull SE, Monrose F, Masson GM. Uncovering spoken phrases in encrypted Voice over IP conversations Acm Transactions On Information and System Security. 13. DOI: 10.1145/1880022.1880029  0.509
2009 Coull SE, Monrose F, Reiter MK, Bailey M. The challenges of effectively anonymizing network data Proceedings - Cybersecurity Applications and Technology Conference For Homeland Security, Catch 2009. 230-236. DOI: 10.1109/CATCH.2009.27  0.555
2008 Wright CV, Ballard L, Coull SE, Monrose F, Masson GM. Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations Proceedings - Ieee Symposium On Security and Privacy. 35-49. DOI: 10.1109/SP.2008.21  0.663
2008 Coull SE, Szymanski BK. Sequence alignment for masquerade detection Computational Statistics and Data Analysis. 52: 4116-4131. DOI: 10.1016/J.Csda.2008.01.022  0.351
2007 Coull SE, Szymanski BK. On the development of an internetwork-centric defense for scanning worms Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1016/J.Cose.2009.07.003  0.453
Show low-probability matches.