Gregory Conti
Gregory Conti
Director, Army Cyber Institute, West Point
Verified email at usma.edu - Homepage
Title
Cited by
Cited by
Year
IDS RainStorm: Visualizing IDS Alarms.
K Abdullah, CP Lee, GJ Conti, JA Copeland, JT Stasko
VizSEC, 1, 2005
1712005
Passive visual fingerprinting of network attack tools
G Conti, K Abdullah
Proceedings of the 2004 ACM workshop on Visualization and data mining for …, 2004
1582004
Real-time and forensic network data analysis using animated and coordinated visualization
S Krasser, G Conti, J Grizzard, J Gribschaw, H Owen
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, 42-49, 2005
1422005
Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets.
B Sangster, TJ O'Connor, T Cook, R Fanelli, E Dean, C Morrell, GJ Conti
CSET, 2009
1232009
Visualizing network data for intrusion detection
K Abdullah, C Lee, G Conti, JA Copeland
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop …, 2005
972005
Visual reverse engineering of binary and data files
G Conti, E Dean, M Sinda, B Sangster
International Workshop on Visualization for Computer Security, 1-17, 2008
892008
Visual reverse engineering of binary and data files
G Conti, E Dean, M Sinda, B Sangster
International Workshop on Visualization for Computer Security, 1-17, 2008
892008
Automated mapping of large binary objects using primitive fragment type classification
G Conti, S Bratus, A Shubina, B Sangster, R Ragsdale, M Supan, ...
digital investigation 7, S3-S12, 2010
852010
Attacking information visualization system usability overloading and deceiving the human
G Conti, M Ahamad, J Stasko
Proceedings of the 2005 symposium on Usable privacy and security, 89-100, 2005
752005
An honest man has nothing to fear: user perceptions on web-based information disclosure
G Conti, E Sobiesk
Proceedings of the 3rd Symposium on Usable Privacy and Security, 112-121, 2007
622007
Countering security information overload through alert and packet visualization
G Conti, K Abdullah, J Grizzard, J Stasko, JA Copeland, M Ahamad, ...
IEEE Computer Graphics and Applications 26 (2), 60-70, 2006
622006
Countering security information overload through alert and packet visualization
G Conti, K Abdullah, J Grizzard, J Stasko, JA Copeland, M Ahamad, ...
IEEE Computer Graphics and Applications 26 (2), 60-70, 2006
622006
VSO/ALP: Comparing past and current challenges to Afghan local defense
L Saum-Manning
RAND Corporation Working Paper, WR-936. Available at http://www. rand. org …, 2012
46*2012
Malicious interface design: exploiting the user
G Conti, E Sobiesk
Proceedings of the 19th international conference on World wide web, 271-280, 2010
452010
Visual exploration of malicious network objects using semantic zoom, interactive encoding and dynamic queries
G Conti, J Grizzard, M Ahamad, H Owen
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 83-90, 2005
442005
Cyber education: a multi-level, multi-discipline approach
E Sobiesk, J Blair, G Conti, M Lanham, H Taylor
Proceedings of the 16th annual conference on information technology …, 2015
392015
Hacking competitions and their untapped potential for security education
G Conti, T Babbitt, J Nelson
IEEE Security & Privacy 9 (3), 56-59, 2011
372011
Why computer scientists should attend hacker conferences
G Conti
Communications of the ACM 48 (3), 23-24, 2005
332005
Key terrain in cyberspace: Seeking the high ground
D Raymond, T Cross, G Conti, M Nowatkowski
2014 6th International Conference On Cyber Conflict (CyCon 2014), 287-300, 2014
322014
Towards a cyber common operating picture
G Conti, J Nelson, D Raymond
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-17, 2013
322013
The system can't perform the operation now. Try again later.
Articles 1–20