Skip Ribbon Commands
Skip to main content
Publications (Academic Year 2008-09)
  • J. Doty, T. OConnor; "Leadership Versus Information Technology Management-Where Do We Go From Here?" Army Magazine, pp. 20-22, February 2009.
  • T. OConnor, D. Reeves; "Bluetooth Network-Based Misuse Detection," ACSAC 2008 Conference Proceedings, pp.377-391, 2008 Annual Computer Security Applications Conference, December 2008
  • G. Conti, E. Dean, M. Sinda, and B. Sangster; "Visual Reverse Engineering of Binary and Data Files;" Workshop on Visualization for Computer Security (VizSEC); September 2008.
  • G. Conti. “Could Googling Take Down a President, a Prime Minister, or an Average Citizen?” DEFCON, August 2008. (accepted for presentation)
  • G. Conti and E. Dean. “Visual Forensic Analysis and Reverse Engineering of Binary Data,” Black Hat USA, August 2008. (accepted for presentation)