Scott E. Coull, Ph.D. - Publications
Affiliations: | 2009 | Johns Hopkins University, Baltimore, MD |
Area:
Computer ScienceYear | Citation | Score | |||
---|---|---|---|---|---|
2012 | Coull SE, White AM, Yen TF, Monrose F, Reiter MK. Understanding domain registration abuses Computers and Security. 31: 806-815. DOI: 10.1016/J.Cose.2012.05.005 | 0.539 | |||
2011 | Coull SE, Green M, Hohenberger S. Access controls for oblivious and anonymous systems Acm Transactions On Information and System Security. 14. DOI: 10.1145/1952982.1952992 | 0.337 | |||
2010 | Wright CV, Ballard L, Coull SE, Monrose F, Masson GM. Uncovering spoken phrases in encrypted Voice over IP conversations Acm Transactions On Information and System Security. 13. DOI: 10.1145/1880022.1880029 | 0.509 | |||
2009 | Coull SE, Monrose F, Reiter MK, Bailey M. The challenges of effectively anonymizing network data Proceedings - Cybersecurity Applications and Technology Conference For Homeland Security, Catch 2009. 230-236. DOI: 10.1109/CATCH.2009.27 | 0.555 | |||
2008 | Wright CV, Ballard L, Coull SE, Monrose F, Masson GM. Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations Proceedings - Ieee Symposium On Security and Privacy. 35-49. DOI: 10.1109/SP.2008.21 | 0.663 | |||
2008 | Coull SE, Szymanski BK. Sequence alignment for masquerade detection Computational Statistics and Data Analysis. 52: 4116-4131. DOI: 10.1016/J.Csda.2008.01.022 | 0.351 | |||
2007 | Coull SE, Szymanski BK. On the development of an internetwork-centric defense for scanning worms Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1016/J.Cose.2009.07.003 | 0.453 | |||
Show low-probability matches. |