Follow
John Goodall
Title
Cited by
Cited by
Year
Developing an ontology for cyber security knowledge graphs
M Iannacone, S Bohn, G Nakamura, J Gerth, K Huffer, R Bridges, ...
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
1372015
Preserving the big picture: Visual network traffic analysis with tnv
JR Goodall, WG Lutters, P Rheingans, A Komlodi
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 47-54, 2005
1352005
I know my network: collaboration and expertise in intrusion detection
JR Goodall, WG Lutters, A Komlodi
Proceedings of the 2004 ACM conference on Computer supported cooperative …, 2004
982004
The work of intrusion detection: rethinking the role of security analysts
J Goodall, W Lutters, A Komlodi
892004
Automatic labeling for entity extraction in cyber security
RA Bridges, CL Jones, MD Iannacone, KM Testa, JR Goodall
arXiv preprint arXiv:1308.4941, 2013
882013
Towards a relation extraction framework for cyber-security concepts
CL Jones, RA Bridges, KMT Huffer, JR Goodall
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
872015
Developing expertise for network intrusion detection
JR Goodall, WG Lutters, A Komlodi
Information Technology & People 22 (2), 92-108, 2009
802009
An information visualization framework for intrusion detection
A Komlodi, JR Goodall, WG Lutters
CHI'04 extended abstracts on Human factors in computing systems, 1743, 2004
792004
A user-centered look at glyph-based security visualization
A Komlodi, P Rheingans, U Ayachit, JR Goodall, A Joshi
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 21-28, 2005
782005
Focusing on context in network traffic analysis
JR Goodall, WG Lutters, P Rheingans, A Komlodi
IEEE Computer Graphics and Applications 26 (2), 72-80, 2006
732006
Camus: automatically mapping cyber assets to missions and users
JR Goodall, A D'Amico, JK Kopylec
MILCOM 2009-2009 IEEE Military Communications Conference, 1-7, 2009
642009
Situ: Identifying and explaining suspicious behavior in networks
JR Goodall, ED Ragan, CA Steed, JW Reed, GD Richardson, KMT Huffer, ...
IEEE transactions on visualization and computer graphics 25 (1), 204-214, 2018
632018
Visual discovery in computer network defense
AD D'Amico, JR Goodall, DR Tesone, JK Kopylec
IEEE Computer Graphics and Applications 27 (5), 20-27, 2007
612007
Introduction to visualization for computer security
JR Goodall
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer …, 2008
592008
Visualization is better! a comparative evaluation
JR Goodall
2009 6th International Workshop on Visualization for Cyber Security, 57-68, 2009
552009
Visual analysis of code security
JR Goodall, H Radwan, L Halseth
Proceedings of the seventh international symposium on visualization for …, 2010
542010
Real-time detection and classification of anomalous events in streaming data
EM Ferragut, JR Goodall, MD Iannacone, JA Laska, LT Harrison
US Patent 9,319,421, 2016
522016
VIAssist: Visual analytics for cyber defense
JR Goodall, M Sowul
2009 IEEE conference on technologies for homeland security, 143-150, 2009
502009
Mission impact of cyber events: scenarios and ontology to express the relationships between cyber assets, missions, and users
A D'Amico, L Buchanan, J Goodall, P Walczak
APPLIED VISIONS INC NORTHPORT NY, 2009
492009
A user-centered approach to visualizing network traffic for intrusion detection
JR Goodall, AA Ozok, WG Lutters, P Rheingans, A Komlodi
CHI'05 Extended Abstracts on Human Factors in Computing Systems, 1403-1406, 2005
492005
The system can't perform the operation now. Try again later.
Articles 1–20