Author: John R. Goodall

Publication Overview

Publication period start: 2007
Number of co-authors: 14

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

D'Amico, Anita D., Goodall, John R., Tesone, Daniel R., Kopylec, Jason K. (2007): Visual Discovery in Computer Network Defense. In IEEE Computer Graphics and Applications, 27 (5) pp. 20-27. https://doi.ieeecomputersociety.org/10.1109/MCG.2007.137
Goodall, John R., Lutters, Wayne G., Rheingans, Penny, Komlodi, Anita (2006): Focusing on Context in Network Traffic Analysis. In IEEE Computer Graphics and Applications, 26 (2) pp. 72-80. https://doi.ieeecomputersociety.org/10.1109/MCG.2006.31
Goodall, John R., Lutters, Wayne G., Komlodi, Anita (2004): I know my network: collaboration and expertise in intrusion detection. In: Proceedings of ACM CSCW04 Conference on Computer-Supported Cooperative Work , 2004, . pp. 342-345. https://doi.acm.org/10.1145/1031607.1031663
Goodall, John R. (2006): Visualizing network traffic for intrusion detection. In: Proceedings of DIS06: Designing Interactive Systems: Processes, Practices, Methods, & Techniques , 2006, . pp. 363-364. https://doi.acm.org/10.1145/1142405.1142465
Goodall, John R., Ozok, A. Ant, Lutters, Wayne G., Rheingans, Penny, Komlodi, Anita (2005): A user-centered approach to visualizing network traffic for intrusion detection. In: Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems , 2005, . pp. 1403-1406. https://doi.acm.org/10.1145/1056808.1056927
Goodall, John R., Conti, Gregory, Ma, Kwan-Liu (eds.) Proceedings of the Fourth International Workshop on Visualization for Computer Security VizSEC 2007 October 29, 2007, Sacramento, CA, USA.
Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA.
Goodall, John R., Lutters, Wayne G., Rheingans, Penny, Komlodi, Anita (2005): Preserving the Big Picture: Visual Network Traffic Analysis with TN. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 6. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.17
Komlodi, Anita, Rheingans, Penny, Ayachit, Utkarsha, Goodall, John R., Joshi, Amit (2005): A User-centered Look at Glyph-based Security Visualization. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 3. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.1
Prole, Kenneth, Goodall, John R., D\'Amico, Anita D., Kopylec, Jason K. (2008): Wireless Cyber Assets Discovery Visualization. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 136-143. https://dx.doi.org/10.1007/978-3-540-85933-8_13
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Get one powerful email each week, like 326,076 others.

Learn to design a life you love.

Next email in
6
days
15
hrs
25
mins
36
secs