IDS RainStorm: Visualizing IDS Alarms. K Abdullah, CP Lee, GJ Conti, JA Copeland, JT Stasko VizSEC, 1, 2005 | 191 | 2005 |
Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets. B Sangster, TJ O'connor, T Cook, R Fanelli, E Dean, C Morrell, GJ Conti CSET, 2009 | 189 | 2009 |
Malicious interface design: exploiting the user G Conti, E Sobiesk Proceedings of the 19th international conference on World wide web, 271-280, 2010 | 171 | 2010 |
Passive visual fingerprinting of network attack tools G Conti, K Abdullah Proceedings of the 2004 ACM workshop on Visualization and data mining for …, 2004 | 168 | 2004 |
Real-time and forensic network data analysis using animated and coordinated visualization S Krasser, G Conti, J Grizzard, J Gribschaw, H Owen Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, 42-49, 2005 | 148 | 2005 |
Visual reverse engineering of binary and data files G Conti, E Dean, M Sinda, B Sangster International Workshop on Visualization for Computer Security, 1-17, 2008 | 147 | 2008 |
Automated mapping of large binary objects using primitive fragment type classification G Conti, S Bratus, A Shubina, B Sangster, R Ragsdale, M Supan, ... digital investigation 7, S3-S12, 2010 | 125 | 2010 |
Visualizing network data for intrusion detection K Abdullah, C Lee, G Conti, JA Copeland Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop …, 2005 | 97 | 2005 |
Attacking information visualization system usability overloading and deceiving the human G Conti, M Ahamad, J Stasko Proceedings of the 2005 symposium on Usable privacy and security, 89-100, 2005 | 89 | 2005 |
An honest man has nothing to fear: user perceptions on web-based information disclosure G Conti, E Sobiesk Proceedings of the 3rd Symposium on Usable Privacy and Security, 112-121, 2007 | 82 | 2007 |
Cyber education: a multi-level, multi-discipline approach E Sobiesk, J Blair, G Conti, M Lanham, H Taylor Proceedings of the 16th annual conference on information technology …, 2015 | 65 | 2015 |
Countering security information overload through alert and packet visualization G Conti, K Abdullah, J Grizzard, J Stasko, JA Copeland, M Ahamad, ... IEEE Computer Graphics and Applications 26 (2), 60-70, 2006 | 62 | 2006 |
Introduction of Thinopyrum intermedium ssp. trichophorum chromosomes to wheat by trigeneric hybridization involving Triticum, Secale and Thinopyrum genera J Li, T Lang, B Li, Z Yu, H Wang, G Li, E Yang, Z Yang Planta 245, 1121-1135, 2017 | 58* | 2017 |
A visual study of primitive binary fragment types G Conti, S Bratus, A Shubina, A Lichtenberg, R Ragsdale, ... White Paper, Black Hat USA, 2010 | 58 | 2010 |
Inefficiently automated law enforcement W Hartzog, G Conti, J Nelson, LA Shay Mich. St. L. Rev., 1763, 2015 | 53 | 2015 |
Key terrain in cyberspace: Seeking the high ground D Raymond, T Cross, G Conti, M Nowatkowski 2014 6th International Conference On Cyber Conflict (CyCon 2014), 287-300, 2014 | 52 | 2014 |
Visual exploration of malicious network objects using semantic zoom, interactive encoding and dynamic queries G Conti, J Grizzard, M Ahamad, H Owen IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 83-90, 2005 | 49 | 2005 |
Hacking competitions and their untapped potential for security education G Conti, T Babbitt, J Nelson IEEE Security & Privacy 9 (3), 56-59, 2011 | 48 | 2011 |
Towards a cyber common operating picture G Conti, J Nelson, D Raymond 2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-17, 2013 | 42 | 2013 |
On cyber: towards an operational art for cyber conflict G Conti, D Raymond Kopidion Press, 2017 | 38 | 2017 |