IDS RainStorm: Visualizing IDS Alarms. K Abdullah, CP Lee, GJ Conti, JA Copeland, JT Stasko VizSEC, 1, 2005 | 172 | 2005 |
Passive visual fingerprinting of network attack tools G Conti, K Abdullah Proceedings of the 2004 ACM workshop on Visualization and data mining for …, 2004 | 159 | 2004 |
Real-time and forensic network data analysis using animated and coordinated visualization S Krasser, G Conti, J Grizzard, J Gribschaw, H Owen Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, 42-49, 2005 | 143 | 2005 |
Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets. B Sangster, TJ O'Connor, T Cook, R Fanelli, E Dean, C Morrell, GJ Conti CSET, 2009 | 125 | 2009 |
Visualizing network data for intrusion detection K Abdullah, C Lee, G Conti, JA Copeland Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop …, 2005 | 98 | 2005 |
Visual reverse engineering of binary and data files G Conti, E Dean, M Sinda, B Sangster International Workshop on Visualization for Computer Security, 1-17, 2008 | 91 | 2008 |
Visual reverse engineering of binary and data files G Conti, E Dean, M Sinda, B Sangster International Workshop on Visualization for Computer Security, 1-17, 2008 | 91 | 2008 |
Automated mapping of large binary objects using primitive fragment type classification G Conti, S Bratus, A Shubina, B Sangster, R Ragsdale, M Supan, ... digital investigation 7, S3-S12, 2010 | 85 | 2010 |
Attacking information visualization system usability overloading and deceiving the human G Conti, M Ahamad, J Stasko Proceedings of the 2005 symposium on Usable privacy and security, 89-100, 2005 | 75 | 2005 |
An honest man has nothing to fear: user perceptions on web-based information disclosure G Conti, E Sobiesk Proceedings of the 3rd Symposium on Usable Privacy and Security, 112-121, 2007 | 63 | 2007 |
Countering security information overload through alert and packet visualization G Conti, K Abdullah, J Grizzard, J Stasko, JA Copeland, M Ahamad, ... IEEE Computer Graphics and Applications 26 (2), 60-70, 2006 | 63 | 2006 |
Countering security information overload through alert and packet visualization G Conti, K Abdullah, J Grizzard, J Stasko, JA Copeland, M Ahamad, ... IEEE Computer Graphics and Applications 26 (2), 60-70, 2006 | 63 | 2006 |
VSO/ALP: Comparing past and current challenges to Afghan local defense L Saum-Manning RAND Corporation Working Paper, WR-936. Available at http://www. rand. org …, 2012 | 46* | 2012 |
Malicious interface design: exploiting the user G Conti, E Sobiesk Proceedings of the 19th international conference on World wide web, 271-280, 2010 | 45 | 2010 |
Visual exploration of malicious network objects using semantic zoom, interactive encoding and dynamic queries G Conti, J Grizzard, M Ahamad, H Owen IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 83-90, 2005 | 44 | 2005 |
Cyber education: a multi-level, multi-discipline approach E Sobiesk, J Blair, G Conti, M Lanham, H Taylor Proceedings of the 16th annual conference on information technology …, 2015 | 39 | 2015 |
Hacking competitions and their untapped potential for security education G Conti, T Babbitt, J Nelson IEEE Security & Privacy 9 (3), 56-59, 2011 | 38 | 2011 |
Key terrain in cyberspace: Seeking the high ground D Raymond, T Cross, G Conti, M Nowatkowski 2014 6th International Conference On Cyber Conflict (CyCon 2014), 287-300, 2014 | 33 | 2014 |
Why computer scientists should attend hacker conferences G Conti Communications of the ACM 48 (3), 23-24, 2005 | 33 | 2005 |
Towards a cyber common operating picture G Conti, J Nelson, D Raymond 2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-17, 2013 | 32 | 2013 |