What Would You Do With a Nation-State Cyber Army?

Greg Conti
Enigma 2018 (Enigma 2018)

2018
Towards an approach for automatically repairing compromised network systems

J.B. Grizzard , S. Krasser , H.L. Owen , G.J. Conti
network computing and applications 389 -392

16
2004
Developing an undergraduate distributed development course

G.J. Conti , J.M.D. Hill , C.A.Jr. Carver
frontiers in education conference 1

1
2002
Towards a trusted immutable kernel extension (TIKE) for self-healing systems: a virtual machine approach

J.B. Grizzard , E.R. Dodson , G.J. Conti , J.G. Levine
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004. 444 -446

8
2004
Mathematics and Visualization

Gregory Conti John R Goodall Kwan , Liu Ma

2008
IDS RainStorm: Visualizing IDS Alarms.

Kulsoom Abdullah , Christopher P Lee , Gregory J Conti , John A Copeland
VizSEC 1 -1

191
2005
Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets.

Benjamin Sangster , TJ O'connor , Thomas Cook , Robert Fanelli
CSET

186
2009
Information warfare in the trenches: Experiences from the firing range

Scott D Lathrop , Gregory J Conti , Daniel J Ragsdale
Security Education and Critical Infrastructures: IFIP TC11/WG11. 8 Third Annual World Conference on Information Security Education (WISE3) June 26–28, 2003, Monterey, California, USA 3 19 -39

18
2003
Experiences from the Firing Range

Scott D Lathrop , Gregory J Conti , Daniel J Ragsdale
Security Education and Critical Infrastructures: IFIP TC11/WG11. 8 Third Annual World Conference on Information Security Education (WISE3) June 26–28, 2003, Monterey, California, USA 125 19 -19

2013
Information warfare in the trenches

Scott D Lathrop , Gregory J Conti , Daniel J Ragsdale
IFIP World Conference on Information Security Education 19 -39

2003
8
2006
Visualization for Computer Security: 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings

Kwan-Liu Ma , Gregory Conti , John R. Goodall
visualization for computer security 197 -197

2008
Towards a cyber common operating picture

David Raymond , Gregory Conti , John Nelson
international conference on cyber conflict 1 -17

11
2013
A control measure framework to limit collateral damage and propagation of cyber weapons

David Raymond , Gregory Conti , Robert Fanelli , Tom Cross
international conference on cyber conflict 1 -16

10
2013
Googling considered harmful

Gregory Conti
new security paradigms workshop 67 -76

17
2006
Inefficiently Automated Law Enforcement

Woodrow Hartzog , Lisa A. Shay , Gregory Conti , John Nelson
Michigan state law review 2015 ( 5) 1763

42
2016
Deconstructing the Relationship Between Privacy and Security

Woodrow Hartzog , Lisa Shay , Gregory Conti
IEEE Technology and Society 33 ( 2) 28

3
2014