Author: Gregory J. Conti
Publication Overview
Publication period start: 2006
Number of co-authors: 12
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Conti,
Gregory J.
(2008):
Could googling take down a president?.
In
Communications of the ACM,
51
(1)
pp. 71-73.
https://dl.acm.org/doi/10.1145/1327452.1327485
Conti,
Gregory J.
(2006):
Introduction.
In
Communications of the ACM,
49
(6)
pp. 32-36.
https://dl.acm.org/doi/10.1145/1132497
Conti,
Gregory J.,
Abdullah,
Kulsoom,
Grizzard,
Julian B.,
Stasko,
John T.,
Copeland,
John A.,
Ahamad,
Mustaque,
Owen,
Henry L.,
Lee,
Christopher P.
(2006):
Countering Security Information Overload through Alert and Packet Visualization.
In
IEEE Computer Graphics and Applications,
26
(2)
pp. 60-70.
https://doi.ieeecomputersociety.org/10.1109/MCG.2006.30
Conti,
Gregory J.
(2005):
Why computer scientists should attend hacker conferences.
In
Communications of the ACM,
48
(3)
pp. 23-24.
https://dl.acm.org/doi/10.1145/1047671.1047694
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
Conti,
Gregory J.,
Grizzard,
Julian B.,
Ahamad,
Mustaque,
Owen,
Henry L.
(2005):
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding .
In:
Ma,
Kwan-Liu,
North,
Stephen C.,
Yurcik,
William
(eds.)
VizSEC 2005 - IEEE Workshop on Visualization for Computer Security
26 October,
2005,
Minneapolis, MN, USA.
pp. 10.
https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.19
Conti,
Gregory J.,
Abdullah,
Kulsoom
(2004):
Passive visual fingerprinting of network attack tools.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 45-54.
https://doi.acm.org/10.1145/1029208.1029216
Abdullah,
Kulsoom,
Lee,
Christopher P.,
Conti,
Gregory J.,
Copeland,
John A.,
Stasko,
John T.
(2005):
IDS RainStorm: Visualizing IDS Alarms.
In:
Ma,
Kwan-Liu,
North,
Stephen C.,
Yurcik,
William
(eds.)
VizSEC 2005 - IEEE Workshop on Visualization for Computer Security
26 October,
2005,
Minneapolis, MN, USA.
pp. 1.
https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.8
Conti,
Gregory J.,
Dean,
Erik,
Sinda,
Matthew,
Sangster,
Benjamin
(2008):
Visual Reverse Engineering of Binary and Data Files.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 1-17.
https://dx.doi.org/10.1007/978-3-540-85933-8_1