Spremljaj
Scott Coull
Scott Coull
Druga imenaScott Eric Coull, Scott E. Coull
Preverjeni e-poštni naslov na google.com - Domača stran
Naslov
Navedeno
Navedeno
Leto
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
2012 IEEE symposium on security and privacy, 332-346, 2012
6652012
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.
CV Wright, SE Coull, F Monrose
NDSS 9, 2009
4582009
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
CV Wright, L Ballard, SE Coull, F Monrose, GM Masson
2008 IEEE Symposium on Security and Privacy (sp 2008), 35-49, 2008
3312008
Exploring adversarial examples in malware detection
O Suciu, SE Coull, J Johns
2019 IEEE Security and Privacy Workshops (SPW), 8-14, 2019
2662019
{Explanation-Guided} backdoor poisoning attacks against malware classifiers
G Severi, J Meyer, S Coull, A Oprea
30th USENIX security symposium (USENIX security 21), 1487-1504, 2021
2192021
Intrusion detection: A bioinformatics approach
S Coull, J Branch, B Szymanski, E Breimer
Computer Security Applications Conference, 2003. Proceedings. 19th Annual, 24-33, 2003
2112003
Protocol misidentification made easy with format-transforming encryption
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1752013
Adversarial exemples: A survey and experimental evaluation of practical attacks on machine learning for windows malware detection
L Demetrio, SE Coull, B Biggio, G Lagorio, A Armando, F Roli
ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-31, 2021
1612021
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
SE Coull, CV Wright, F Monrose, MP Collins, MK Reiter
Ndss 7, 35-47, 2007
1612007
Traffic analysis of encrypted messaging services: Apple imessage and beyond
SE Coull, KP Dyer
ACM SIGCOMM Computer Communication Review 44 (5), 5-11, 2014
1482014
Sequence alignment for masquerade detection
SE Coull, BK Szymanski
Computational Statistics & Data Analysis 52 (8), 4116-4131, 2008
1192008
On Web Browsing Privacy in Anonymized NetFlows.
SE Coull, MP Collins, CV Wright, F Monrose, MK Reiter
USENIX Security Symposium, 339-352, 2007
1132007
Controlling access to an oblivious database using stateful anonymous credentials
S Coull, M Green, S Hohenberger
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
1002009
Marionette: A programmable network traffic obfuscation system
KP Dyer, SE Coull, T Shrimpton
24th USENIX Security Symposium (USENIX Security 15), 367-382, 2015
832015
Uncovering spoken phrases in encrypted voice over IP conversations
CV Wright, L Ballard, SE Coull, F Monrose, GM Masson
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-30, 2010
712010
Taming the devil: Techniques for evaluating anonymized network data
SE Coull, CV Wright, AD Keromytis, F Monrose, MK Reiter
NDSS, 125-135, 2008
702008
The challenges of effectively anonymizing network data
SE Coull, F Monrose, MK Reiter, M Bailey
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
602009
System and method for analyzing binary code for malware classification using artificial neural network techniques
JT Johns, BS Jones, SE Coull
US Patent 11,108,809, 2021
512021
Activation analysis of a byte-based deep neural network for malware classification
SE Coull, C Gardner
2019 IEEE Security and Privacy Workshops (SPW), 21-27, 2019
492019
System and method for adaptive graphical depiction and selective remediation of cybersecurity threats
SE Coull, JT Johns
US Patent 11,201,890, 2021
312021
Sistem trenutno ne more izvesti postopka. Poskusite znova pozneje.
Članki 1–20