Gregory J. Conti

Affiliations:
  • United States Military Academy, West Point, NY, USA


According to our database1, Gregory J. Conti authored at least 35 papers between 2003 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2016
Evaluating Adversarial Interfaces: An Automated Approach.
IEEE Technol. Soc. Mag., 2016

2015
Cyber Education: A Multi-Level, Multi-Discipline Approach.
Proceedings of the 16th Annual Conference on Information Technology Education, 2015

2014
Deconstructing the Relationship Between Privacy and Security [Viewpoint].
IEEE Technol. Soc. Mag., 2014

Key terrain in cyberspace: Seeking the high ground.
Proceedings of the 6th International Conference on Cyber Conflict, 2014

2013
Automated webpage evaluation.
Proceedings of the 2nd annual conference on Research in information technology, 2013

Beyond sunglasses and spray paint: A taxonomy of surveillance countermeasures.
Proceedings of the Social Implications of Wearable Computing and Augmediated Reality in Everyday Life: 2013 IEEE International Symposium on Technology and Society, 2013

A control measure framework to limit collateral damage and propagation of cyber weapons.
Proceedings of the 5th International Conference on Cyber Conflict, 2013

Towards a cyber common operating picture.
Proceedings of the 5th International Conference on Cyber Conflict, 2013

2012
A framework for analysis of quotidian exposure in an instrumented world.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2012

A methodology for cyber operations targeting and control of collateral damage in the context of lawful armed conflict.
Proceedings of the 4th International Conference on Cyber Conflict, 2012

2011
Embracing the Kobayashi Maru: Why You Should Teach Your Students to Cheat.
IEEE Secur. Priv., 2011

Hacking Competitions and Their Untapped Potential for Security Education.
IEEE Secur. Priv., 2011

2010
Automated mapping of large binary objects using primitive fragment type classification.
Digit. Investig., 2010

Malicious interface design: exploiting the user.
Proceedings of the 19th International Conference on World Wide Web, 2010

2009
Malicious Interfaces and Personalization's Uninviting Future.
IEEE Secur. Priv., 2009

Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets.
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009

2008
Could googling take down a president?
Commun. ACM, 2008

Visual Reverse Engineering of Binary and Data Files.
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008

A Visualization Framework for Self-Monitoring of Web-Based Information Disclosure.
Proceedings of IEEE International Conference on Communications, 2008

2007
The Cost of Free Web Tools.
IEEE Secur. Priv., 2007

Self-monitoring of web-based information disclosure.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

An honest man has nothing to fear: user perceptions on web-based information disclosure.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

2006
Countering Security Information Overload through Alert and Packet Visualization.
IEEE Computer Graphics and Applications, 2006

Introduction.
Commun. ACM, 2006

Googling considered harmful.
Proceedings of the New Security Paradigms Workshop 2006, 2006

2005
A Framework for Countering Denial-of-Information Attacks.
IEEE Secur. Priv., 2005

Why computer scientists should attend hacker conferences.
Commun. ACM, 2005

Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005

IDS RainStorm: Visualizing IDS Alarms.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005

Attacking information visualization system usability overloading and deceiving the human.
Proceedings of the 1st Symposium on Usable Privacy and Security, 2005

Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall.
Proceedings of the Intelligence and Security Informatics, 2005

2004
Passive visual fingerprinting of network attack tools.
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004

Towards an Approach for Automatically Repairing Compromised Network Systems.
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004

2003
Information Warfare in the Trenches.
Proceedings of the Security Education and Critical Infrastructures, 2003

A Comprehensive Undergraduate Information Assurance Program.
Proceedings of the Security Education and Critical Infrastructures, 2003


  Loading...