2009 |
6 | EE | Scott E. Coull,
Matthew Green,
Susan Hohenberger:
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials.
Public Key Cryptography 2009: 501-520 |
2008 |
5 | EE | Charles V. Wright,
Lucas Ballard,
Scott E. Coull,
Fabian Monrose,
Gerald M. Masson:
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations.
IEEE Symposium on Security and Privacy 2008: 35-49 |
4 | EE | Scott E. Coull,
Boleslaw K. Szymanski:
Sequence alignment for masquerade detection.
Computational Statistics & Data Analysis 52(8): 4116-4131 (2008) |
2007 |
3 | EE | Scott E. Coull,
Boleslaw K. Szymanski:
On the Development of an Internetwork-Centric Defense for Scanning Worms.
HICSS 2007: 144 |
2 | EE | Scott E. Coull,
Charles V. Wright,
Fabian Monrose,
Michael P. Collins,
Michael K. Reiter:
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
NDSS 2007 |
2003 |
1 | EE | Scott E. Coull,
Joel W. Branch,
Boleslaw K. Szymanski,
Eric Breimer:
Intrusion Detection: A Bioinformatics Approach.
ACSAC 2003: 24-33 |