Author: John R. Goodall
Publication Overview
Publication period start: 2007
Number of co-authors: 14
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
D'Amico,
Anita D.,
Goodall,
John R.,
Tesone,
Daniel R.,
Kopylec,
Jason K.
(2007):
Visual Discovery in Computer Network Defense.
In
IEEE Computer Graphics and Applications,
27
(5)
pp. 20-27.
https://doi.ieeecomputersociety.org/10.1109/MCG.2007.137
Goodall,
John R.,
Lutters,
Wayne G.,
Rheingans,
Penny,
Komlodi,
Anita
(2006):
Focusing on Context in Network Traffic Analysis.
In
IEEE Computer Graphics and Applications,
26
(2)
pp. 72-80.
https://doi.ieeecomputersociety.org/10.1109/MCG.2006.31
Goodall,
John R.,
Lutters,
Wayne G.,
Komlodi,
Anita
(2004):
I know my network: collaboration and expertise in intrusion detection.
In:
Proceedings of ACM CSCW04 Conference on Computer-Supported Cooperative Work
,
2004,
.
pp. 342-345.
https://doi.acm.org/10.1145/1031607.1031663
Goodall,
John R.
(2006):
Visualizing network traffic for intrusion detection.
In:
Proceedings of DIS06: Designing Interactive Systems: Processes, Practices, Methods, & Techniques
,
2006,
.
pp. 363-364.
https://doi.acm.org/10.1145/1142405.1142465
Goodall,
John R.,
Ozok,
A. Ant,
Lutters,
Wayne G.,
Rheingans,
Penny,
Komlodi,
Anita
(2005):
A user-centered approach to visualizing network traffic for intrusion detection.
In:
Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems
,
2005,
.
pp. 1403-1406.
https://doi.acm.org/10.1145/1056808.1056927
Goodall,
John R.,
Conti,
Gregory,
Ma,
Kwan-Liu
(eds.)
Proceedings of the Fourth International Workshop on Visualization for Computer Security VizSEC 2007
October 29,
2007,
Sacramento, CA, USA.
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
Goodall,
John R.,
Lutters,
Wayne G.,
Rheingans,
Penny,
Komlodi,
Anita
(2005):
Preserving the Big Picture: Visual Network Traffic Analysis with TN.
In:
Ma,
Kwan-Liu,
North,
Stephen C.,
Yurcik,
William
(eds.)
VizSEC 2005 - IEEE Workshop on Visualization for Computer Security
26 October,
2005,
Minneapolis, MN, USA.
pp. 6.
https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.17
Komlodi,
Anita,
Rheingans,
Penny,
Ayachit,
Utkarsha,
Goodall,
John R.,
Joshi,
Amit
(2005):
A User-centered Look at Glyph-based Security Visualization.
In:
Ma,
Kwan-Liu,
North,
Stephen C.,
Yurcik,
William
(eds.)
VizSEC 2005 - IEEE Workshop on Visualization for Computer Security
26 October,
2005,
Minneapolis, MN, USA.
pp. 3.
https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.1
Prole,
Kenneth,
Goodall,
John R.,
D\'Amico,
Anita D.,
Kopylec,
Jason K.
(2008):
Wireless Cyber Assets Discovery Visualization.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 136-143.
https://dx.doi.org/10.1007/978-3-540-85933-8_13