Author: Gregory J. Conti

Publications

Publication period start: 2006
Number of co-authors: 12

Co-authors

Number of publications with favourite co-authors
John A. Copeland
2
John T. Stasko
2
Kulsoom Abdullah
3

Productive Colleagues

Most productive colleagues in number of publications
John R. Goodall
10
Kwan-Liu Ma
60
John T. Stasko
60

Publications

Conti, Gregory J. (2008): Could googling take down a president?. In Communications of the ACM, 51 (1) pp. 71-73. https://dl.acm.org/doi/10.1145/1327452.1327485

Conti, Gregory J. (2006): Introduction. In Communications of the ACM, 49 (6) pp. 32-36. https://dl.acm.org/doi/10.1145/1132497

Conti, Gregory J., Abdullah, Kulsoom, Grizzard, Julian B., Stasko, John T., Copeland, John A., Ahamad, Mustaque, Owen, Henry L., Lee, Christopher P. (2006): Countering Security Information Overload through Alert and Packet Visualization. In IEEE Computer Graphics and Applications, 26 (2) pp. 60-70. https://doi.ieeecomputersociety.org/10.1109/MCG.2006.30

Conti, Gregory J. (2005): Why computer scientists should attend hacker conferences. In Communications of the ACM, 48 (3) pp. 23-24. https://dl.acm.org/doi/10.1145/1047671.1047694

Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA.

Conti, Gregory J., Grizzard, Julian B., Ahamad, Mustaque, Owen, Henry L. (2005): Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding . In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 10. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.19

Conti, Gregory J., Abdullah, Kulsoom (2004): Passive visual fingerprinting of network attack tools. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 45-54. https://doi.acm.org/10.1145/1029208.1029216

Abdullah, Kulsoom, Lee, Christopher P., Conti, Gregory J., Copeland, John A., Stasko, John T. (2005): IDS RainStorm: Visualizing IDS Alarms. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 1. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.8

Conti, Gregory J., Dean, Erik, Sinda, Matthew, Sangster, Benjamin (2008): Visual Reverse Engineering of Binary and Data Files. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 1-17. https://dx.doi.org/10.1007/978-3-540-85933-8_1

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,220 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,220 designers enjoy our newsletter—sure you don’t want to receive it?