dblp.uni-trier.dewww.uni-trier.de

Gregory J. Conti

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
20 John R. Goodall, Gregory J. Conti, Kwan-Liu Ma: Visualization for Computer Security, 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings Springer 2008
19EEJohn R. Goodall, Gregory J. Conti, Kwan-Liu Ma: VizSEC 2007, Proceedings of the Workshop on Visualization for Computer Security, Sacramento, California, USA, October 29, 2007 Springer 2008
18EEKulsoom Abdullah, Gregory J. Conti, Raheem A. Beyah: A Visualization Framework for Self-Monitoring of Web-Based Information Disclosure. ICC 2008: 1700-1707
17EEGregory J. Conti, Erik Dean, Matthew Sinda, Benjamin Sangster: Visual Reverse Engineering of Binary and Data Files. VizSEC 2008: 1-17
16EEGregory J. Conti: Could googling take down a president? Commun. ACM 51(1): 71-73 (2008)
2007
15EEGregory J. Conti, Edward Sobiesk: An honest man has nothing to fear: user perceptions on web-based information disclosure. SOUPS 2007: 112-121
14EEKulsoom Abdullah, Gregory J. Conti, Edward Sobiesk: Self-monitoring of web-based information disclosure. WPES 2007: 56-59
2006
13EEGregory J. Conti: Googling considered harmful. NSPW 2006: 67-76
12EEGregory J. Conti: Introduction. Commun. ACM 49(6): 32-36 (2006)
11EEGregory J. Conti, Kulsoom Abdullah, Julian B. Grizzard, John T. Stasko, John A. Copeland, Mustaque Ahamad, Henry L. Owen, Christopher P. Lee: Countering Security Information Overload through Alert and Packet Visualization. IEEE Computer Graphics and Applications 26(2): 60-70 (2006)
2005
10EEGregory J. Conti, Mustaque Ahamad, Robert Norback: Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall. ISI 2005: 492-497
9EEGregory J. Conti, Mustaque Ahamad, John T. Stasko: Attacking information visualization system usability overloading and deceiving the human. SOUPS 2005: 89-100
8EEKulsoom Abdullah, Christopher P. Lee, Gregory J. Conti, John A. Copeland, John T. Stasko: IDS RainStorm: Visualizing IDS Alarms. VizSEC 2005: 1
7EEGregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen: Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. VizSEC 2005: 10
6EEGregory J. Conti: Why computer scientists should attend hacker conferences. Commun. ACM 48(3): 23-24 (2005)
5EEGregory J. Conti, Mustaque Ahamad: A Framework for Countering Denial-of-Information Attacks. IEEE Security & Privacy 3(6): 50-56 (2005)
2004
4EEJulian B. Grizzard, Sven Krasser, Henry L. Owen, Gregory J. Conti, Eric R. Dodson: Towards an Approach for Automatically Repairing Compromised Network Systems. NCA 2004: 389-392
3EEGregory J. Conti, Kulsoom Abdullah: Passive visual fingerprinting of network attack tools. VizSEC 2004: 45-54
2003
2 Scott D. Lathrop, Gregory J. Conti, Daniel Ragsdale: Information Warfare in the Trenches. World Conference on Information Security Education 2003: 19-39
1 Gregory J. Conti, John M. D. Hill, Scott Lathrop, Kenneth L. Alford, Daniel Ragsdale: A Comprehensive Undergraduate Information Assurance Program. World Conference on Information Security Education 2003: 243-260

Coauthor Index

1Kulsoom Abdullah [3] [8] [11] [14] [18]
2Mustaque Ahamad [5] [7] [9] [10] [11]
3Kenneth L. Alford [1]
4Raheem A. Beyah [18]
5John A. Copeland [8] [11]
6Erik Dean [17]
7Eric R. Dodson [4]
8John R. Goodall [19] [20]
9Julian B. Grizzard [4] [7] [11]
10John M. D. Hill [1]
11Sven Krasser [4]
12Scott Lathrop [1]
13Scott D. Lathrop [2]
14Christopher P. Lee [8] [11]
15Kwan-Liu Ma [19] [20]
16Robert Norback [10]
17Henry L. Owen [4] [7] [11]
18Daniel Ragsdale [1] [2]
19Benjamin Sangster [17]
20Matthew Sinda [17]
21Edward Sobiesk [14] [15]
22John T. Stasko [8] [9] [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)