Scott E. Coull

According to our database1, Scott E. Coull authored at least 31 papers between 2003 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification.
CoRR, 2019

Exploring Adversarial Examples in Malware Detection.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

2018
Exploring Adversarial Examples in Malware Detection.
CoRR, 2018

2015
Marionette: A Programmable Network Traffic Obfuscation System.
Proceedings of the 24th USENIX Security Symposium, 2015

2014
Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond.
IACR Cryptology ePrint Archive, 2014

Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond.
CoRR, 2014

Traffic Analysis of Encrypted Messaging Services: Apple iMessage and Beyond.
Computer Communication Review, 2014

2013
Protocol misidentification made easy with format-transforming encryption.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Format-Transforming Encryption: More than Meets the DPI.
IACR Cryptology ePrint Archive, 2012

Understanding domain registration abuses.
Computers & Security, 2012

Toward Efficient Querying of Compressed Network Payloads.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

2011
Traffic Analysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Access controls for oblivious and anonymous systems.
ACM Trans. Inf. Syst. Secur., 2011

Bounded Vector Signatures and their Applications.
IACR Cryptology ePrint Archive, 2011

On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses.
Proceedings of the Network and Distributed System Security Symposium, 2011

Bounded vector signatures and their applications.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations.
ACM Trans. Inf. Syst. Secur., 2010

Understanding Domain Registration Abuses.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

2009
On the development of an internetwork-centric defense for scanning worms.
Computers & Security, 2009

Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials.
Proceedings of the Public Key Cryptography, 2009

Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.
Proceedings of the Network and Distributed System Security Symposium, 2009

2008
Access Controls for Oblivious and Anonymous Systems.
IACR Cryptology ePrint Archive, 2008

Sequence alignment for masquerade detection.
Computational Statistics & Data Analysis, 2008

Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008), 2008

Taming the Devil: Techniques for Evaluating Anonymized Network Data.
Proceedings of the Network and Distributed System Security Symposium, 2008

2007
On Web Browsing Privacy in Anonymized NetFlows.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
Proceedings of the Network and Distributed System Security Symposium, 2007

On the Development of an Internetwork-Centric Defense for Scanning Worms.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2003
Intrusion Detection: A Bioinformatics Approach.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003


  Loading...