Follow
Gregory Conti
Gregory Conti
Principal, Kopidion Cybersecurity
Verified email at usma.edu - Homepage
Title
Cited by
Cited by
Year
IDS RainStorm: Visualizing IDS Alarms.
K Abdullah, CP Lee, GJ Conti, JA Copeland, JT Stasko
VizSEC, 1, 2005
1882005
Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets.
B Sangster, TJ O'connor, T Cook, R Fanelli, E Dean, C Morrell, GJ Conti
CSET, 2009
1712009
Passive visual fingerprinting of network attack tools
G Conti, K Abdullah
Proceedings of the 2004 ACM workshop on Visualization and data mining for …, 2004
1662004
Real-time and forensic network data analysis using animated and coordinated visualization
S Krasser, G Conti, J Grizzard, J Gribschaw, H Owen
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, 42-49, 2005
1462005
Visual reverse engineering of binary and data files
G Conti, E Dean, M Sinda, B Sangster
International Workshop on Visualization for Computer Security, 1-17, 2008
1352008
Visual reverse engineering of binary and data files
G Conti, E Dean, M Sinda, B Sangster
International Workshop on Visualization for Computer Security, 1-17, 2008
1352008
Malicious interface design: exploiting the user
G Conti, E Sobiesk
Proceedings of the 19th international conference on World wide web, 271-280, 2010
1162010
Automated mapping of large binary objects using primitive fragment type classification
G Conti, S Bratus, A Shubina, B Sangster, R Ragsdale, M Supan, ...
digital investigation 7, S3-S12, 2010
1112010
Visualizing network data for intrusion detection
K Abdullah, C Lee, G Conti, JA Copeland
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop …, 2005
952005
Attacking information visualization system usability overloading and deceiving the human
G Conti, M Ahamad, J Stasko
Proceedings of the 2005 symposium on Usable privacy and security, 89-100, 2005
892005
An honest man has nothing to fear: user perceptions on web-based information disclosure
G Conti, E Sobiesk
Proceedings of the 3rd Symposium on Usable Privacy and Security, 112-121, 2007
742007
Countering security information overload through alert and packet visualization
G Conti, K Abdullah, J Grizzard, J Stasko, JA Copeland, M Ahamad, ...
IEEE Computer Graphics and Applications 26 (2), 60-70, 2006
642006
Countering security information overload through alert and packet visualization
G Conti, K Abdullah, J Grizzard, J Stasko, JA Copeland, M Ahamad, ...
IEEE Computer Graphics and Applications 26 (2), 60-70, 2006
642006
Cyber education: a multi-level, multi-discipline approach
E Sobiesk, J Blair, G Conti, M Lanham, H Taylor
Proceedings of the 16th annual conference on information technology …, 2015
602015
Introduction of Thinopyrum intermedium ssp. trichophorum chromosomes to wheat by trigeneric hybridization involving Triticum, Secale and Thinopyrum genera
J Li, T Lang, B Li, Z Yu, H Wang, G Li, E Yang, Z Yang
Planta 245, 1121-1135, 2017
56*2017
A visual study of primitive binary fragment types
G Conti, S Bratus, A Shubina, A Lichtenberg, R Ragsdale, ...
White Paper, Black Hat USA, 2010
562010
Key terrain in cyberspace: Seeking the high ground
D Raymond, T Cross, G Conti, M Nowatkowski
2014 6th International Conference On Cyber Conflict (CyCon 2014), 287-300, 2014
502014
Visual exploration of malicious network objects using semantic zoom, interactive encoding and dynamic queries
G Conti, J Grizzard, M Ahamad, H Owen
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 83-90, 2005
482005
Inefficiently automated law enforcement
W Hartzog, G Conti, J Nelson, LA Shay
Mich. St. L. Rev., 1763, 2015
462015
Hacking competitions and their untapped potential for security education
G Conti, T Babbitt, J Nelson
IEEE Security & Privacy 9 (3), 56-59, 2011
452011
The system can't perform the operation now. Try again later.
Articles 1–20