Author: John R. Goodall
Publications
Co-authors
Productive Colleagues
- Wayne G. Lutters
- Penny Rheingans
- Kwan-Liu Ma
- 23
- 28
- 60
Publications
D'Amico, Anita D., Goodall, John R., Tesone, Daniel R., Kopylec, Jason K. (2007): Visual Discovery in Computer Network Defense. In IEEE Computer Graphics and Applications, 27 (5) pp. 20-27. https://doi.ieeecomputersociety.org/10.1109/MCG.2007.137
Goodall, John R., Lutters, Wayne G., Rheingans, Penny, Komlodi, Anita (2006): Focusing on Context in Network Traffic Analysis. In IEEE Computer Graphics and Applications, 26 (2) pp. 72-80. https://doi.ieeecomputersociety.org/10.1109/MCG.2006.31
Goodall, John R., Lutters, Wayne G., Komlodi, Anita (2004): I know my network: collaboration and expertise in intrusion detection. In: Proceedings of ACM CSCW04 Conference on Computer-Supported Cooperative Work , 2004, . pp. 342-345. https://doi.acm.org/10.1145/1031607.1031663
Goodall, John R. (2006): Visualizing network traffic for intrusion detection. In: Proceedings of DIS06: Designing Interactive Systems: Processes, Practices, Methods, & Techniques , 2006, . pp. 363-364. https://doi.acm.org/10.1145/1142405.1142465
Goodall, John R., Ozok, A. Ant, Lutters, Wayne G., Rheingans, Penny, Komlodi, Anita (2005): A user-centered approach to visualizing network traffic for intrusion detection. In: Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems , 2005, . pp. 1403-1406. https://doi.acm.org/10.1145/1056808.1056927
Goodall, John R., Conti, Gregory, Ma, Kwan-Liu (eds.) Proceedings of the Fourth International Workshop on Visualization for Computer Security VizSEC 2007 October 29, 2007, Sacramento, CA, USA.
Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA.
Goodall, John R., Lutters, Wayne G., Rheingans, Penny, Komlodi, Anita (2005): Preserving the Big Picture: Visual Network Traffic Analysis with TN. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 6. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.17
Komlodi, Anita, Rheingans, Penny, Ayachit, Utkarsha, Goodall, John R., Joshi, Amit (2005): A User-centered Look at Glyph-based Security Visualization. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 3. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.1
Prole, Kenneth, Goodall, John R., D\'Amico, Anita D., Kopylec, Jason K. (2008): Wireless Cyber Assets Discovery Visualization. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 136-143. https://dx.doi.org/10.1007/978-3-540-85933-8_13