Conference and Workshop Publications
Edward Sobiesk, Jean Blair, Gregory Conti, Michael Lanham, and Howard Taylor, “Cyber Education: A Multi-Level, Multi-Discipline Approach,” in Proceedings of the ACM Special Interest Group for Information Technology Education Conference, Chicago, October 2015.
David Raymond, Gregory Conti, Tom Cross, and Michael Nowatkowski. "Key Terrain in Cyberspace: Seeking the High Ground." International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2014.
W Michael Petullo, Xu Zhang, Jon A Solworth, Daniel J Bernstein and Tanja Lange. "MinimaLT: Minimal-latency Networking Through Better Security." Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, NY. Nov., 2013.
Geoff Stoker, Todd Arnold, and Paul Maxwell. "Using virtual machines to improve learning and save resources in an introductory IT course." Proceedings of SIGITE '13 Proceedings of the 14th annual ACM SIGITE conference on Information technology education, 10 October, 2013.
David Raymond, Gregory Conti, Tom Cross, and Robert Fanelli. "A Control Measure Framework to Limit Collateral Damage and Propagation of Cyber Weapons." International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2013.
Gregory Conti, John Nelson, and David Raymond. "Towards a Cyber Common Operating Picture." International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2013.
Lisa Shay, Gregory Conti, and Woodrow Hartzog. "Beyond Sunglasses and Spray Paint: A Taxonomy of Countermeasures Against Overly-Intrusive Surveillance." IEEE International Symposium on Technology and Society (ISTAS), Toronto, June 2013.
Lisa Shay, Woodrow Hartzog, John Nelson, and Gregory Conti. "Do Robots Dream of Electric Laws? An Experiment in the Law as Algorithm." We Robot, Stanford, April 2013.
Lisa Shay, Gregory Conti, Dominic Larkin and John Nelson. "A Framework for Analysis of Quotidian Exposure in an Instrumented World." IEEE Carnahan Conference on Security Technology, Boston, October 2012.
Paulo Shakarian. "Stuxnet: Revolucion de la Ciberguerra en los Asuntos Militares." Air and Space Power Journal, Edicion en Espanol; Vol. 24, No.3, Third Quarter, 2012.
Journals and Magazines
Gregory Conti, Edward Sobiesk, Paul Anderson, Steven Billington, Alex Farmer, Cory Kirk, Patrick Shaffer, and Kyle Stammer. "Unintended, Malicious, and Evil Applications of Augmented Reality." InSecure, Issue 35, September 2012, pp. 20-27.
Gregory Conti, James Caroland, Thomas Cook, and Howard Taylor. "Self-Development for Cyber Warriors." Small Wars Journal, 10 November 2011.
Gregory Conti, Thomas Babbitt, and John Nelson. "Hacking Competitions and Their Untapped Potential for Security Education." IEEE Security and Privacy, May/June 2011.
Gregory Conti, Dominic Larkin, David Raymond and Edward Sobiesk. "The Military's Cultural Disregard for Personal Information." Small Wars Journal, 6 Dec 2010.
Gregory Conti and Jen Easterly. "Recruiting, Development, and Retention of Cyber Warriors Despite an Inhospitable Culture." Small Wars Journal, 29 July 2010.
Gregory Conti and John "Buck" Surdu. "Army, Navy, Air Force, Cyber: Is it Time for a Cyberwarfare Branch of the Military." Information Assurance Newsletter, Vol. 12, No. 1, Spring 2009, pp. 14-18.
David Raymond, Randy Marchany, Michael Brownfield, and Scott Midkiff,"Effects of denial of sleep attacks on wireless sensor network MAC protocols," in IEEE Transactions on Vehicular Technology, vol. 58, no. 1, pp 367-380, Jan 2009.
David Raymond and Scott Midkiff, "Denial-of-service in wireless sensor networks: Attacks and defenses," in IEEE Pervasive Computing Magazine, vol.7, no. 1, pp. 74-81, Jan.-Mar. 2008.
Sam Abbott-McCune, A.J. Newtson, Robert Ross, Ralph Ware, and Gregory Conti. "Free Visualization Tools for Security Analysis and Network Monitoring." InSecure, Issue 15, February 2008, pp. 18-25.
Kulsoom Abdullah, Chris Lee, Gregory Conti and John Copeland. "Processing Data to Construct Practical Visualizations for Network Security," Information Assurance Newsletter, Vol. 9, No. 1, Summer 2006.
Gregory Conti, Kulsoom Abdullah, Julian Grizzard, John Stasko, John Copeland, Mustaque Ahamad, Henry Owen and Chris Lee. "Countering Security Analyst and Network Administrator Overload Through Alert and Packet Visualization." IEEE Computer Graphics and Applications (CG&A), March 2006.
David Gioe, Len Scott, and Christopher Andrew. "An International History of the Cuban Missile Crisis: A 50-year retrospective." Routledge, 2014.
Paulo Shakarian, Jana Shakarian, and Andrew Ruef. "Introduction to Cyber-Warfare: A Multidisciplinary Approach." Syngress/Elsevier, 2013.
David Raymond, Mark Hagerott, and Michael Black. Cybersecurity and the
Service Academies, Cyber Education Symposium, Washington DC, November 2013.
Gregory Conti, Maureen O'Connor, David Raymond, and General Raymond Odierno. Leadership in Cyberspace: The Game Has Changed, Korn-Ferry, New York, 22 October 2013.
Gregory Conti, Helen Greiner, Peter Singer, Admiral James Stavridis, and Yossi Vardi. Beyond Software: The Future of Conflict, Google Ideas, New York, 22 October 2013.
Chris Rouland and Robert Clark, (Gregory Conti Moderator). The Ethics of Hacking Back: Cybersecurity and Active Network Defense, Carnegie Council, New York, 18 September 2013.
Dmitri Alperovich, Gregory Conti, and Simson Garfinkel. How Do We Create a Viable Cyber Profession: Opportunities and Challenges, AFCEA TechNet Land Forces - East, Baltimore, MD, August 2012.
Marcia Hoffman, Congressman Jim Langevin, Vice Admiral Mike McConnell, Jeff Moss, Sami Saydjari, (Gregory Conti Moderator). The Role of the U.S. Government in Cyberspace, United States Military Academy Senior Conference, West Point, June 2012.
Patti Ihnat, Guillaume Poupard, Howard Schmidt and Frederic Sutter (Gregory Conti Moderator). Structure and Deployment of Cyber Defenders, French American Defense Symposium on Cyber Security, Washington, DC, April 2012.
Gregory Conti, Joel Ogren, Benjamin Shao, Andy Singer (Robert Shea Moderator), Recruiting, Training, and Retaining Tomorrow's Cyber Warriors, AFCEA TechNet Land Forces - Southwest, 28 March 2012.
Jamie Clark, Gregory Conti, Tanya Forsheit, Charles Palmer (Roland Trope Moderator), Deploying Tools to Build or Self-Sabotage the Enterprise: How Do We Square Legal Obligations for Cybersecurity with the Increasing Use of Technologies that Undermine It?, American Bar Association Business Law Section Spring Meeting, 23 March 2012.
Tom Bianculli, Gregory Conti, Raj Goel, Nasir Memon (Paul Stirpe Moderator), Challenges in Cloud Computing, NYIT Cyber Security Conference, 15 September 2011.
Alessandro Acquisti, Ryan Calo, Gregory Conti, and Woodrow Hartzog (Chris Hoofnagle Moderator), Human Computer Interaction and Consumer Protection, Samuelson Law, Technology & Public Policy Clinic, Privacy Scholars Speaker Series. UC Berkeley; 30-31 March 2011.
David Aucsmith, Gregory Conti, David Dagon, Paul Judge, Val Rahmani, Chris Rouland, and Marcus Sachs (Rich DeMillo Moderator), Evolving Nature of Cyber Security Threats, GTISC Security Summit, October 2010.
Gregory Conti, Carrie Gates, John Goodall, Bill Pike (Jeremy Epstein Moderator), Data Visualization Technologies, United States Secret Service Global Cyber Security Conference, Washington, DC, August 2009.
Judit Bar-Ilan, Tom Cross, Martin Kratz and Wendy Seltzer (Gregory Conti Moderator), Web Search Privacy Issues, World Wide Web Conference (WWW2007), May 2007.
Gregory Conti, Googling Considered Harmful (as part of the 2006 Highlights of the New Security Paradigms Workshop Panel), Annual Computer Security Applications Conference(ACSAC), December 2006.
Steve Chan, Gregory Conti and Mary Ellen Zurko (Konstantin Beznosov moderator), Usability of Security Administration vs. Usability of End-user Security Panel, Symposium on Usable Privacy and Security (SOUPS), Carnegie Mellon University, June 2005.
Ed Balas, John Stasko, Kirsten Whitley and Bill Yurcik (Gregory Conti moderator), Visualizing Security Data, IEEE Information Assurance Workshop, West Point, June 2005.