Skip Ribbon Commands
Skip to main content

Army Cyber Institute : Publications

pub_header.png

 
 Conference and Workshop Publications
Journals and Magazines
  • Gregory Conti, James Caroland, Thomas Cook, and Howard Taylor. "Self-Development for Cyber Warriors." Small Wars Journal, 10 November 2011.
  • Gregory Conti and James Caroland. "Embracing the Kobayashi Maru - Why You Should Teach Your Students to Cheat." IEEE Security and Privacy, July/August 2011.
  • Gregory Conti and David Raymond. "Leadership of Cyber Warriors: Enduring Principles and New Directions." Small Wars Journal, 11 July 2011.
  • Gregory Conti, Thomas Babbitt, and John Nelson. "Hacking Competitions and Their Untapped Potential for Security Education." IEEE Security and Privacy, May/June 2011.
  • Gregory Conti, Dominic Larkin, David Raymond and Edward Sobiesk. "The Military's Cultural Disregard for Personal Information." Small Wars Journal, 6 Dec 2010.
  • Gregory Conti and Jen Easterly. "Recruiting, Development, and Retention of Cyber Warriors Despite an Inhospitable Culture." Small Wars Journal, 29 July 2010.
  • Gregory Conti. "Mystical Math." ACM netWorker, Vol 13, Issue 4, Winter 2009.
  • Gregory Conti. "There's a Fly in My Digital Soup." ACM netWorker, Vol 13, Issue 2, Summer 2009.
  • Gregory Conti and Edward Sobiesk. "Malicious Interfaces and Personalization's Uninviting Future." IEEE Security and Privacy, May/June 2009.
  • Gregory Conti and John "Buck" Surdu. "Army, Navy, Air Force, Cyber: Is it Time for a Cyberwarfare Branch of the Military." Information Assurance Newsletter, Vol. 12, No. 1, Spring 2009, pp. 14-18. 
  • David Raymond, Randy Marchany, Michael Brownfield, and Scott Midkiff,"Effects of denial of sleep attacks on wireless sensor network MAC protocols," in IEEE Transactions on Vehicular Technology, vol. 58, no. 1, pp 367-380, Jan 2009.
  • David Raymond and Scott Midkiff, "Denial-of-service in wireless sensor networks: Attacks and defenses," in IEEE Pervasive Computing Magazine, vol.7, no. 1, pp. 74-81, Jan.-Mar. 2008.
  • Sam Abbott-McCune, A.J. Newtson, Robert Ross, Ralph Ware, and Gregory Conti. "Free Visualization Tools for Security Analysis and Network Monitoring." InSecure, Issue 15, February 2008, pp. 18-25.
  • Gregory Conti. "Could Googling Take Down a President?" Communications of the ACM (50th Anniversary Issue), January 2008.
  • Edward Sobiesk and Gregory Conti. "The Cost of Free Web Tools." IEEE Security and Privacy, May/June 2007.
  • Gregory Conti (guest editor). "Hacking and Innovation (special issue)." Communications of the ACM (CACM), June 2006.
  • Kulsoom Abdullah, Chris Lee, Gregory Conti and John Copeland. "Processing Data to Construct Practical Visualizations for Network Security," Information Assurance Newsletter, Vol. 9, No. 1, Summer 2006.
  • Gregory Conti, Kulsoom Abdullah, Julian Grizzard, John Stasko, John Copeland, Mustaque Ahamad, Henry Owen and Chris Lee. "Countering Security Analyst and Network Administrator Overload Through Alert and Packet Visualization." IEEE Computer Graphics and Applications (CG&A), March 2006.
  • Gregory Conti and Mustaque Ahamad. "A Taxonomy and Framework for Countering Denial of Information Attacks." IEEE Security and Privacy. November/December 2005.
  • Gregory Conti. "Why Computer Scientists Should Attend Hacker Conferences." Communications of the ACM (CACM), March 2005.
  • Gregory Conti. "Thinking Out of the Box." Military Review, April 1998.
  • Gregory Conti. "You Can't Circle X a Deadlined Computer." Military Intelligence, December 1994.
  • Gregory Conti. "Automation: An Intelligence Multiplier." Military Intelligence, June 1994.

 

Books

  • David Gioe, Len Scott, and Christopher Andrew. "An International History of the Cuban Missile Crisis: A 50-year retrospective." Routledge, 2014.
  • Aaron Brantly. "Chapter 5: Defining the role of intelligence in cyber: a hybrid push and pull." in Phythian, Mark. "Understanding the Intelligence Cycle." Routledge, 2013.
  • Paulo Shakarian, Jana Shakarian, and Andrew Ruef. "Introduction to Cyber-Warfare: A Multidisciplinary Approach." Syngress/Elsevier, 2013.
  • Greg Conti. Googling Security, Addison Wesley, November 2008.
  • Greg Conti. Security Data Visualization, No Starch Press, September 2007.
Panels
  • David Raymond, Mark Hagerott, and Michael Black.  Cybersecurity and the
    Service Academies, Cyber Education Symposium, Washington DC, November 2013.
  • Gregory Conti, Maureen O'Connor, David Raymond, and General Raymond Odierno. Leadership in Cyberspace: The Game Has Changed, Korn-Ferry, New York, 22 October 2013.
  • Gregory Conti, Helen Greiner, Peter Singer, Admiral James Stavridis, and Yossi Vardi. Beyond Software: The Future of Conflict, Google Ideas, New York, 22 October 2013.
  • Chris Rouland and Robert Clark, (Gregory Conti Moderator). The Ethics of Hacking Back: Cybersecurity and Active Network Defense, Carnegie Council, New York, 18 September 2013.
  • Dmitri Alperovich, Gregory Conti, and Simson Garfinkel. How Do We Create a Viable Cyber Profession: Opportunities and Challenges, AFCEA TechNet Land Forces - East, Baltimore, MD, August 2012.
  • Marcia Hoffman, Congressman Jim Langevin, Vice Admiral Mike McConnell, Jeff Moss, Sami Saydjari, (Gregory Conti Moderator). The Role of the U.S. Government in Cyberspace, United States Military Academy Senior Conference, West Point, June 2012.
  • Patti Ihnat, Guillaume Poupard, Howard Schmidt and Frederic Sutter (Gregory Conti Moderator). Structure and Deployment of Cyber Defenders, French American Defense Symposium on Cyber Security, Washington, DC, April 2012.
  • Gregory Conti, Joel Ogren, Benjamin Shao, Andy Singer (Robert Shea Moderator), Recruiting, Training, and Retaining Tomorrow's Cyber Warriors, AFCEA TechNet Land Forces - Southwest, 28 March 2012.
  • Jamie Clark, Gregory Conti, Tanya Forsheit, Charles Palmer (Roland Trope Moderator), Deploying Tools to Build or Self-Sabotage the Enterprise: How Do We Square Legal Obligations for Cybersecurity with the Increasing Use of Technologies that Undermine It?, American Bar Association Business Law Section Spring Meeting, 23 March 2012.
  • Tom Bianculli, Gregory Conti, Raj Goel, Nasir Memon (Paul Stirpe Moderator), Challenges in Cloud Computing, NYIT Cyber Security Conference, 15 September 2011.
  • Alessandro Acquisti, Ryan Calo, Gregory Conti, and Woodrow Hartzog (Chris Hoofnagle Moderator), Human Computer Interaction and Consumer Protection, Samuelson Law, Technology & Public Policy Clinic, Privacy Scholars Speaker Series. UC Berkeley; 30-31 March 2011.
  • David Aucsmith, Gregory Conti, David Dagon, Paul Judge, Val Rahmani, Chris Rouland, and Marcus Sachs (Rich DeMillo Moderator), Evolving Nature of Cyber Security Threats, GTISC Security Summit, October 2010.  
  • Gregory Conti, Carrie Gates, John Goodall, Bill Pike (Jeremy Epstein Moderator), Data Visualization Technologies, United States Secret Service Global Cyber Security Conference, Washington, DC, August 2009.
  • Judit Bar-Ilan, Tom Cross, Martin Kratz and Wendy Seltzer (Gregory Conti Moderator), Web Search Privacy Issues, World Wide Web Conference (WWW2007), May 2007.
  • Gregory Conti, Googling Considered Harmful (as part of the 2006 Highlights of the New Security Paradigms Workshop Panel), Annual Computer Security Applications Conference(ACSAC), December 2006. 
  • Steve Chan, Gregory Conti and Mary Ellen Zurko (Konstantin Beznosov moderator), Usability of Security Administration vs. Usability of End-user Security Panel, Symposium on Usable Privacy and Security (SOUPS), Carnegie Mellon University, June 2005.
  • Ed Balas, John Stasko, Kirsten Whitley and Bill Yurcik (Gregory Conti moderator), Visualizing Security Data, IEEE Information Assurance Workshop, West Point, June 2005.