John R. Goodall

Personal Homepage
Employer
()
Email

Publication Statistics

Publication period start
2004
Publication period end
2008
Number of co-authors
14

Co-authors
Number of publications with favourite co-authors

Productive Colleagues
Most productive colleagues in number of publications

Publications

Prole, Kenneth, Goodall, John R., D\'Amico, Anita D., Kopylec, Jason K. (2008): Wireless Cyber Assets Discovery Visualization. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 136-143. http://dx.doi.org/10.1007/978-3-540-85933-8_13

D'Amico, Anita D., Goodall, John R., Tesone, Daniel R., Kopylec, Jason K. (2007): Visual Discovery in Computer Network Defense. In IEEE Computer Graphics and Applications, 27 (5) pp. 20-27. http://doi.ieeecomputersociety.org/10.1109/MCG.2007.137

Goodall, John R. (2006): Visualizing network traffic for intrusion detection. In: Proceedings of DIS06: Designing Interactive Systems: Processes, Practices, Methods, & Techniques , 2006, . pp. 363-364. http://doi.acm.org/10.1145/1142405.1142465

Goodall, John R., Lutters, Wayne G., Rheingans, Penny, Komlodi, Anita (2006): Focusing on Context in Network Traffic Analysis. In IEEE Computer Graphics and Applications, 26 (2) pp. 72-80. http://doi.ieeecomputersociety.org/10.1109/MCG.2006.31

Goodall, John R., Ozok, A. Ant, Lutters, Wayne G., Rheingans, Penny, Komlodi, Anita (2005): A user-centered approach to visualizing network traffic for intrusion detection. In: Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems , 2005, . pp. 1403-1406. http://doi.acm.org/10.1145/1056808.1056927

Goodall, John R., Lutters, Wayne G., Rheingans, Penny, Komlodi, Anita (2005): Preserving the Big Picture: Visual Network Traffic Analysis with TN. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 6. http://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.17

Komlodi, Anita, Rheingans, Penny, Ayachit, Utkarsha, Goodall, John R., Joshi, Amit (2005): A User-centered Look at Glyph-based Security Visualization. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 3. http://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.1

Goodall, John R., Lutters, Wayne G., Komlodi, Anita (2004): I know my network: collaboration and expertise in intrusion detection. In: Proceedings of ACM CSCW04 Conference on Computer-Supported Cooperative Work , 2004, . pp. 342-345. http://doi.acm.org/10.1145/1031607.1031663

Goodall, John R., Conti, Gregory, Ma, Kwan-Liu (eds.) Proceedings of the Fourth International Workshop on Visualization for Computer Security VizSEC 2007 October 29, 2007, Sacramento, CA, USA.

Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA.