Gregory J. Conti

Personal Homepage
Employer
()
Email

Publication Statistics

Publication period start
2004
Publication period end
2008
Number of co-authors
12

Co-authors
Number of publications with favourite co-authors

Productive Colleagues
Most productive colleagues in number of publications

Publications

Conti, Gregory J., Dean, Erik, Sinda, Matthew, Sangster, Benjamin (2008): Visual Reverse Engineering of Binary and Data Files. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 1-17. http://dx.doi.org/10.1007/978-3-540-85933-8_1

Conti, Gregory J. (2008): Could googling take down a president?. In Communications of the ACM, 51 (1) pp. 71-73. http://doi.acm.org/10.1145/1327452.1327485

Conti, Gregory J. (2006): Introduction. In Communications of the ACM, 49 (6) pp. 32-36. http://doi.acm.org/10.1145/1132497

Conti, Gregory J., Abdullah, Kulsoom, Grizzard, Julian B., Stasko, John T., Copeland, John A., Ahamad, Mustaque, Owen, Henry L., Lee, Christopher P. (2006): Countering Security Information Overload through Alert and Packet Visualization. In IEEE Computer Graphics and Applications, 26 (2) pp. 60-70. http://doi.ieeecomputersociety.org/10.1109/MCG.2006.30

Conti, Gregory J., Grizzard, Julian B., Ahamad, Mustaque, Owen, Henry L. (2005): Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding . In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 10. http://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.19

Abdullah, Kulsoom, Lee, Christopher P., Conti, Gregory J., Copeland, John A., Stasko, John T. (2005): IDS RainStorm: Visualizing IDS Alarms. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 1. http://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.8

Conti, Gregory J. (2005): Why computer scientists should attend hacker conferences. In Communications of the ACM, 48 (3) pp. 23-24. http://doi.acm.org/10.1145/1047671.1047694

Conti, Gregory J., Abdullah, Kulsoom (2004): Passive visual fingerprinting of network attack tools. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 45-54. http://doi.acm.org/10.1145/1029208.1029216

Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA.