Gregory Conti
Gregory Conti
Principal, Kopidion Cybersecurity
Dirección de correo verificada de - Página principal
Citado por
Citado por
IDS RainStorm: Visualizing IDS Alarms.
K Abdullah, CP Lee, GJ Conti, JA Copeland, JT Stasko
VizSEC, 1, 2005
Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets.
B Sangster, TJ O'connor, T Cook, R Fanelli, E Dean, C Morrell, GJ Conti
CSET, 2009
Passive visual fingerprinting of network attack tools
G Conti, K Abdullah
Proceedings of the 2004 ACM workshop on Visualization and data mining for …, 2004
Malicious interface design: exploiting the user
G Conti, E Sobiesk
Proceedings of the 19th international conference on World wide web, 271-280, 2010
Real-time and forensic network data analysis using animated and coordinated visualization
S Krasser, G Conti, J Grizzard, J Gribschaw, H Owen
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, 42-49, 2005
Visual reverse engineering of binary and data files
G Conti, E Dean, M Sinda, B Sangster
International Workshop on Visualization for Computer Security, 1-17, 2008
Automated mapping of large binary objects using primitive fragment type classification
G Conti, S Bratus, A Shubina, B Sangster, R Ragsdale, M Supan, ...
digital investigation 7, S3-S12, 2010
Visualizing network data for intrusion detection
K Abdullah, C Lee, G Conti, JA Copeland
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop …, 2005
Attacking information visualization system usability overloading and deceiving the human
G Conti, M Ahamad, J Stasko
Proceedings of the 2005 symposium on Usable privacy and security, 89-100, 2005
An honest man has nothing to fear: user perceptions on web-based information disclosure
G Conti, E Sobiesk
Proceedings of the 3rd Symposium on Usable Privacy and Security, 112-121, 2007
Cyber education: a multi-level, multi-discipline approach
E Sobiesk, J Blair, G Conti, M Lanham, H Taylor
Proceedings of the 16th annual conference on information technology …, 2015
Countering security information overload through alert and packet visualization
G Conti, K Abdullah, J Grizzard, J Stasko, JA Copeland, M Ahamad, ...
IEEE Computer Graphics and Applications 26 (2), 60-70, 2006
A visual study of primitive binary fragment types
G Conti, S Bratus, A Shubina, A Lichtenberg, R Ragsdale, ...
White Paper, Black Hat USA, 2010
Introduction of Thinopyrum intermedium ssp. trichophorum chromosomes to wheat by trigeneric hybridization involving Triticum, Secale and Thinopyrum genera
J Li, T Lang, B Li, Z Yu, H Wang, G Li, E Yang, Z Yang
Planta 245, 1121-1135, 2017
Inefficiently automated law enforcement
W Hartzog, G Conti, J Nelson, LA Shay
Mich. St. L. Rev., 1763, 2015
Key terrain in cyberspace: Seeking the high ground
D Raymond, T Cross, G Conti, M Nowatkowski
2014 6th International Conference On Cyber Conflict (CyCon 2014), 287-300, 2014
Visual exploration of malicious network objects using semantic zoom, interactive encoding and dynamic queries
G Conti, J Grizzard, M Ahamad, H Owen
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 83-90, 2005
Hacking competitions and their untapped potential for security education
G Conti, T Babbitt, J Nelson
IEEE Security & Privacy 9 (3), 56-59, 2011
Towards a cyber common operating picture
G Conti, J Nelson, D Raymond
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-17, 2013
On cyber: towards an operational art for cyber conflict
G Conti, D Raymond
Kopidion Press, 2017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20