Author: Gregory J. Conti

Publication Overview

Publication period start: 2006
Number of co-authors: 12

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Conti, Gregory J. (2008): Could googling take down a president?. In Communications of the ACM, 51 (1) pp. 71-73. https://dl.acm.org/doi/10.1145/1327452.1327485
Conti, Gregory J. (2006): Introduction. In Communications of the ACM, 49 (6) pp. 32-36. https://dl.acm.org/doi/10.1145/1132497
Conti, Gregory J., Abdullah, Kulsoom, Grizzard, Julian B., Stasko, John T., Copeland, John A., Ahamad, Mustaque, Owen, Henry L., Lee, Christopher P. (2006): Countering Security Information Overload through Alert and Packet Visualization. In IEEE Computer Graphics and Applications, 26 (2) pp. 60-70. https://doi.ieeecomputersociety.org/10.1109/MCG.2006.30
Conti, Gregory J. (2005): Why computer scientists should attend hacker conferences. In Communications of the ACM, 48 (3) pp. 23-24. https://dl.acm.org/doi/10.1145/1047671.1047694
Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA.
Conti, Gregory J., Grizzard, Julian B., Ahamad, Mustaque, Owen, Henry L. (2005): Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding . In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 10. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.19
Conti, Gregory J., Abdullah, Kulsoom (2004): Passive visual fingerprinting of network attack tools. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 45-54. https://doi.acm.org/10.1145/1029208.1029216
Abdullah, Kulsoom, Lee, Christopher P., Conti, Gregory J., Copeland, John A., Stasko, John T. (2005): IDS RainStorm: Visualizing IDS Alarms. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 1. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.8
Conti, Gregory J., Dean, Erik, Sinda, Matthew, Sangster, Benjamin (2008): Visual Reverse Engineering of Binary and Data Files. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 1-17. https://dx.doi.org/10.1007/978-3-540-85933-8_1
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Get one powerful email each week, like 326,015 others.

Learn to design a life you love.

Next email in
6
days
0
hrs
25
mins
53
secs