2008 |
5 | EE | Charles V. Wright,
Lucas Ballard,
Scott E. Coull,
Fabian Monrose,
Gerald M. Masson:
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations.
IEEE Symposium on Security and Privacy 2008: 35-49 |
2007 |
4 | EE | Scott E. Coull,
Charles V. Wright,
Fabian Monrose,
Michael P. Collins,
Michael K. Reiter:
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
NDSS 2007 |
2006 |
3 | EE | Charles V. Wright,
Fabian Monrose,
Gerald M. Masson:
Using visual motifs to classify encrypted traffic.
VizSEC 2006: 41-50 |
2 | EE | Charles V. Wright,
Fabian Monrose,
Gerald M. Masson:
On Inferring Application Protocol Behaviors in Encrypted Network Traffic.
Journal of Machine Learning Research 6: 2745-2769 (2006) |
2004 |
1 | EE | Charles V. Wright,
Fabian Monrose,
Gerald M. Masson:
HMM profiles for network traffic classification.
VizSEC 2004: 9-15 |