2008 |
20 | | John R. Goodall,
Gregory J. Conti,
Kwan-Liu Ma:
Visualization for Computer Security, 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings
Springer 2008 |
19 | EE | John R. Goodall,
Gregory J. Conti,
Kwan-Liu Ma:
VizSEC 2007, Proceedings of the Workshop on Visualization for Computer Security, Sacramento, California, USA, October 29, 2007
Springer 2008 |
18 | EE | Kulsoom Abdullah,
Gregory J. Conti,
Raheem A. Beyah:
A Visualization Framework for Self-Monitoring of Web-Based Information Disclosure.
ICC 2008: 1700-1707 |
17 | EE | Gregory J. Conti,
Erik Dean,
Matthew Sinda,
Benjamin Sangster:
Visual Reverse Engineering of Binary and Data Files.
VizSEC 2008: 1-17 |
16 | EE | Gregory J. Conti:
Could googling take down a president?
Commun. ACM 51(1): 71-73 (2008) |
2007 |
15 | EE | Gregory J. Conti,
Edward Sobiesk:
An honest man has nothing to fear: user perceptions on web-based information disclosure.
SOUPS 2007: 112-121 |
14 | EE | Kulsoom Abdullah,
Gregory J. Conti,
Edward Sobiesk:
Self-monitoring of web-based information disclosure.
WPES 2007: 56-59 |
2006 |
13 | EE | Gregory J. Conti:
Googling considered harmful.
NSPW 2006: 67-76 |
12 | EE | Gregory J. Conti:
Introduction.
Commun. ACM 49(6): 32-36 (2006) |
11 | EE | Gregory J. Conti,
Kulsoom Abdullah,
Julian B. Grizzard,
John T. Stasko,
John A. Copeland,
Mustaque Ahamad,
Henry L. Owen,
Christopher P. Lee:
Countering Security Information Overload through Alert and Packet Visualization.
IEEE Computer Graphics and Applications 26(2): 60-70 (2006) |
2005 |
10 | EE | Gregory J. Conti,
Mustaque Ahamad,
Robert Norback:
Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall.
ISI 2005: 492-497 |
9 | EE | Gregory J. Conti,
Mustaque Ahamad,
John T. Stasko:
Attacking information visualization system usability overloading and deceiving the human.
SOUPS 2005: 89-100 |
8 | EE | Kulsoom Abdullah,
Christopher P. Lee,
Gregory J. Conti,
John A. Copeland,
John T. Stasko:
IDS RainStorm: Visualizing IDS Alarms.
VizSEC 2005: 1 |
7 | EE | Gregory J. Conti,
Julian B. Grizzard,
Mustaque Ahamad,
Henry L. Owen:
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries.
VizSEC 2005: 10 |
6 | EE | Gregory J. Conti:
Why computer scientists should attend hacker conferences.
Commun. ACM 48(3): 23-24 (2005) |
5 | EE | Gregory J. Conti,
Mustaque Ahamad:
A Framework for Countering Denial-of-Information Attacks.
IEEE Security & Privacy 3(6): 50-56 (2005) |
2004 |
4 | EE | Julian B. Grizzard,
Sven Krasser,
Henry L. Owen,
Gregory J. Conti,
Eric R. Dodson:
Towards an Approach for Automatically Repairing Compromised Network Systems.
NCA 2004: 389-392 |
3 | EE | Gregory J. Conti,
Kulsoom Abdullah:
Passive visual fingerprinting of network attack tools.
VizSEC 2004: 45-54 |
2003 |
2 | | Scott D. Lathrop,
Gregory J. Conti,
Daniel Ragsdale:
Information Warfare in the Trenches.
World Conference on Information Security Education 2003: 19-39 |
1 | | Gregory J. Conti,
John M. D. Hill,
Scott Lathrop,
Kenneth L. Alford,
Daniel Ragsdale:
A Comprehensive Undergraduate Information Assurance Program.
World Conference on Information Security Education 2003: 243-260 |