Follow
John Goodall
Title
Cited by
Cited by
Year
Developing an ontology for cyber security knowledge graphs
M Iannacone, S Bohn, G Nakamura, J Gerth, K Huffer, R Bridges, ...
Proceedings of the 10th annual cyber and information security research …, 2015
1812015
Preserving the big picture: Visual network traffic analysis with tnv
JR Goodall, WG Lutters, P Rheingans, A Komlodi
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 47-54, 2005
1402005
Towards a relation extraction framework for cyber-security concepts
CL Jones, RA Bridges, KMT Huffer, JR Goodall
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
1152015
Automatic labeling for entity extraction in cyber security
RA Bridges, CL Jones, MD Iannacone, KM Testa, JR Goodall
arXiv preprint arXiv:1308.4941, 2013
1142013
I know my network: collaboration and expertise in intrusion detection
JR Goodall, WG Lutters, A Komlodi
Proceedings of the 2004 ACM conference on Computer supported cooperative …, 2004
1092004
The work of intrusion detection: rethinking the role of security analysts
J Goodall, W Lutters, A Komlodi
922004
Developing expertise for network intrusion detection
JR Goodall, WG Lutters, A Komlodi
Information Technology & People 22 (2), 92-108, 2009
892009
An information visualization framework for intrusion detection
A Komlodi, JR Goodall, WG Lutters
CHI'04 extended abstracts on Human factors in computing systems, 1743, 2004
832004
Situ: Identifying and explaining suspicious behavior in networks
JR Goodall, ED Ragan, CA Steed, JW Reed, GD Richardson, KMT Huffer, ...
IEEE transactions on visualization and computer graphics 25 (1), 204-214, 2018
822018
A user-centered look at glyph-based security visualization
A Komlodi, P Rheingans, U Ayachit, JR Goodall, A Joshi
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 21-28, 2005
802005
Focusing on context in network traffic analysis
JR Goodall, WG Lutters, P Rheingans, A Komlodi
IEEE Computer Graphics and Applications 26 (2), 72-80, 2006
742006
Camus: automatically mapping cyber assets to missions and users
JR Goodall, A D'Amico, JK Kopylec
MILCOM 2009-2009 IEEE Military Communications Conference, 1-7, 2009
672009
Real-time detection and classification of anomalous events in streaming data
EM Ferragut, JR Goodall, MD Iannacone, JA Laska, LT Harrison
US Patent 9,319,421, 2016
642016
Visualization is better! A comparative evaluation
JR Goodall
2009 6th International Workshop on Visualization for Cyber Security, 57-68, 2009
622009
Introduction to visualization for computer security
JR Goodall
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer …, 2008
612008
Visual discovery in computer network defense
AD D'Amico, JR Goodall, DR Tesone, JK Kopylec
IEEE Computer Graphics and Applications 27 (5), 20-27, 2007
602007
Visual analysis of code security
JR Goodall, H Radwan, L Halseth
Proceedings of the seventh international symposium on visualization for …, 2010
582010
VIAssist: Visual analytics for cyber defense
JR Goodall, M Sowul
2009 IEEE conference on technologies for homeland security, 143-150, 2009
572009
Pace: Pattern accurate computationally efficient bootstrapping for timely discovery of cyber-security concepts
N McNeil, RA Bridges, MD Iannacone, B Czejdo, N Perez, JR Goodall
2013 12th International Conference on Machine Learning and Applications 2, 60-65, 2013
562013
MISSION IMPACT OF CYBER EVENTS: SCENARIOS AND ONTOLOGY TO EXPRESS THE RELATIONSHIPS BETWEEN CYBER ASSETS, MISSIONS, AND USERS (PREPRINT)
A D’Amico, L Buchanan, J Goodall, P Walczak
492009
The system can't perform the operation now. Try again later.
Articles 1–20