Gregory J. Conti
Affiliations:- United States Military Academy, West Point, NY, USA
According to our database1,
Gregory J. Conti
authored at least 35 papers
between 2003 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
2004
2006
2008
2010
2012
2014
2016
0
1
2
3
4
5
6
7
1
1
2
1
1
1
1
2
2
1
1
4
2
1
1
2
2
1
4
2
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2016
IEEE Technol. Soc. Mag., 2016
2015
Proceedings of the 16th Annual Conference on Information Technology Education, 2015
2014
IEEE Technol. Soc. Mag., 2014
Proceedings of the 6th International Conference on Cyber Conflict, 2014
2013
Proceedings of the 2nd annual conference on Research in information technology, 2013
Proceedings of the Social Implications of Wearable Computing and Augmediated Reality in Everyday Life: 2013 IEEE International Symposium on Technology and Society, 2013
A control measure framework to limit collateral damage and propagation of cyber weapons.
Proceedings of the 5th International Conference on Cyber Conflict, 2013
Proceedings of the 5th International Conference on Cyber Conflict, 2013
2012
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2012
A methodology for cyber operations targeting and control of collateral damage in the context of lawful armed conflict.
Proceedings of the 4th International Conference on Cyber Conflict, 2012
2011
IEEE Secur. Priv., 2011
IEEE Secur. Priv., 2011
2010
Automated mapping of large binary objects using primitive fragment type classification.
Digit. Investig., 2010
Proceedings of the 19th International Conference on World Wide Web, 2010
2009
IEEE Secur. Priv., 2009
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009
2008
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008
Proceedings of IEEE International Conference on Communications, 2008
2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
An honest man has nothing to fear: user perceptions on web-based information disclosure.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
2006
IEEE Computer Graphics and Applications, 2006
Proceedings of the New Security Paradigms Workshop 2006, 2006
2005
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005
Attacking information visualization system usability overloading and deceiving the human.
Proceedings of the 1st Symposium on Usable Privacy and Security, 2005
Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall.
Proceedings of the Intelligence and Security Informatics, 2005
2004
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004
2003
Information Warfare in the Trenches.
Proceedings of the Security Education and Critical Infrastructures, 2003
A Comprehensive Undergraduate Information Assurance Program.
Proceedings of the Security Education and Critical Infrastructures, 2003