default search action
John R. Goodall
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j8]Jeremy E. Block, Shaghayegh Esmaeili, Eric D. Ragan, John R. Goodall, G. David Richardson:
The Influence of Visual Provenance Representations on Strategies in a Collaborative Hand-off Data Analysis Scenario. IEEE Trans. Vis. Comput. Graph. 29(1): 1113-1123 (2023) - 2022
- [i8]Jeremy E. Block, Shaghayegh Esmaeili, Eric D. Ragan, John R. Goodall, G. David Richardson:
The Influence of Visual Provenance Representations on Strategies in a Collaborative Hand-off Data Analysis Scenario. CoRR abs/2208.03900 (2022) - 2020
- [j7]Chad A. Steed, John R. Goodall, Junghoon Chae, Artem Trofimov:
CrossVis: A visual analytics system for exploring heterogeneous multivariate data with applications to materials and climate sciences. Graph. Vis. Comput. 3: 200013 (2020) - [c26]Eric D. Ragan, Andrew Pachuilo, John R. Goodall, Felipe Bacim:
Preserving Contextual Awareness during Selection of Moving Targets in Animated Stream Visualizations. AVI 2020: 28:1-28:9 - [c25]Eric D. Ragan, Andrew S. Stamps, John R. Goodall:
Empirical Study of Focus-Plus-Context and Aggregation Techniques for the Visualization of Streaming Data. AVI 2020: 55:1-55:5 - [c24]Sean Oesch, Robert A. Bridges, Jared M. Smith, Justin M. Beaver, John R. Goodall, Kelly M. T. Huffer, Craig Miles, Daniel Scofield:
An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 634-641 - [i7]Sean Oesch, Robert A. Bridges, Jared M. Smith, Justin M. Beaver, John R. Goodall, Kelly M. T. Huffer, Craig Miles, Daniel Scofield:
An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center. CoRR abs/2012.09013 (2020)
2010 – 2019
- 2019
- [j6]John R. Goodall, Eric D. Ragan, Chad A. Steed, Joel W. Reed, G. David Richardson, Kelly M. T. Huffer, Robert A. Bridges, Jason A. Laska:
Situ: Identifying and Explaining Suspicious Behavior in Networks. IEEE Trans. Vis. Comput. Graph. 25(1): 204-214 (2019) - [c23]Junghoon Chae, Chad A. Steed, John R. Goodall, Steven Hahn:
Dynamic Color Mapping with a Multi-Scale Histogram: A Design Study with Physical Scientists. Visualization and Data Analysis 2019 - 2018
- [i6]Robert A. Bridges, Maria A. Vincent, Kelly M. T. Huffer, John R. Goodall, Jessie D. Jamieson, Zachary Burch:
Forming IDEAS Interactive Data Exploration & Analysis System. CoRR abs/1805.09676 (2018) - [i5]Robert A. Bridges, Michael D. Iannacone, John R. Goodall, Justin M. Beaver:
How do information security workers use host data? A summary of interviews with security analysts. CoRR abs/1812.02867 (2018) - 2017
- [c22]Robert A. Bridges, Kelly M. T. Huffer, Corinne L. Jones, Michael D. Iannacone, John R. Goodall:
Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors. ICMLA 2017: 437-442 - [e7]Joseph P. Trien, Stacy J. Prowell, John R. Goodall, Justin M. Beaver, Robert A. Bridges:
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, CISRC 2017, Oak Ridge, TN, USA, April 4 - 6, 2017. ACM 2017, ISBN 978-1-4503-4855-3 [contents] - 2016
- [c21]Christopher R. Harshaw, Robert A. Bridges, Michael D. Iannacone, Joel W. Reed, John R. Goodall:
GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection. CISRC 2016: 15:1-15:4 - [e6]Joseph P. Trien, Stacy J. Prowell, John R. Goodall, Robert A. Bridges:
Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016, Oak Ridge, TN, USA, April 5-7, 2016. ACM 2016, ISBN 978-1-4503-3752-6 [contents] - [i4]Christopher R. Harshaw, Robert A. Bridges, Michael D. Iannacone, Joel W. Reed, John R. Goodall:
GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection. CoRR abs/1602.01130 (2016) - 2015
- [c20]Eric D. Ragan, John R. Goodall, Albert Tung:
Evaluating How Level of Detail of Visual History Affects Process Memory. CHI 2015: 2711-2720 - [c19]Corinne L. Jones, Robert A. Bridges, Kelly M. T. Huffer, John R. Goodall:
Towards a Relation Extraction Framework for Cyber-Security Concepts. CISR 2015: 11:1-11:4 - [c18]Michael D. Iannacone, Shawn Bohn, Grant Nakamura, John Gerth, Kelly M. T. Huffer, Robert A. Bridges, Erik M. Ferragut, John R. Goodall:
Developing an Ontology for Cyber Security Knowledge Graphs. CISR 2015: 12:1-12:4 - [e5]Joseph P. Trien, Stacy J. Prowell, Robert A. Bridges, John R. Goodall:
Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015. ACM 2015, ISBN 978-1-4503-3345-0 [contents] - [i3]Corinne L. Jones, Robert A. Bridges, Kelly M. T. Huffer, John R. Goodall:
Towards a relation extraction framework for cyber-security concepts. CoRR abs/1504.04317 (2015) - 2014
- [c17]Eric D. Ragan, John R. Goodall:
Evaluation methodology for comparing memory and communication of analytic processes in visual analytics. BELIV 2014: 27-34 - [c16]Bogdan D. Czejdo, Michael D. Iannacone, Robert A. Bridges, Erik M. Ferragut, John R. Goodall:
Integration of external data sources with cyber security data warehouse. CISR 2014: 49-52 - 2013
- [c15]Nikki McNeil, Robert A. Bridges, Michael D. Iannacone, Bogdan D. Czejdo, Nicolas Perez, John R. Goodall:
PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-security Concepts. ICMLA (2) 2013: 60-65 - [e4]John R. Goodall, Kwan-Liu Ma, Sophie Engle, Fabian Fischer:
10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta, GA, USA, October 14, 2013. ACM 2013, ISBN 978-1-4503-2173-0 [contents] - [i2]Nikki McNeil, Robert A. Bridges, Michael D. Iannacone, Bogdan D. Czejdo, Nicolas Perez, John R. Goodall:
PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts. CoRR abs/1308.4648 (2013) - [i1]Robert A. Bridges, Corinne L. Jones, Michael D. Iannacone, John R. Goodall:
Automatic Labeling for Entity Extraction in Cyber Security. CoRR abs/1308.4941 (2013) - 2012
- [j5]John R. Goodall, Florian Mansmann, John Gerth:
Computer network visualization [Guest Editorial]. IEEE Netw. 26(6): 4-5 (2012) - [c14]Lane Harrison, Jason A. Laska, Riley Spahn, Michael D. Iannacone, Evan Downing, Erik M. Ferragut, John R. Goodall:
situ: Situational understanding and discovery for cyber attacks. IEEE VAST 2012: 307-308 - [c13]Lane Harrison, Riley Spahn, Michael D. Iannacone, Evan Downing, John R. Goodall:
NV: Nessus vulnerability visualization for the web. VizSEC 2012: 25-32 - 2011
- [j4]John R. Goodall:
An Evaluation of Visual and Textual Network Analysis Tools. Inf. Vis. 10(2): 145-157 (2011) - 2010
- [c12]John R. Goodall, Hassan Radwan, Lenny Halseth:
Visual analysis of code security. VizSEC 2010: 46-51
2000 – 2009
- 2009
- [j3]John R. Goodall, Wayne G. Lutters, Anita Komlodi:
Developing expertise for network intrusion detection. Inf. Technol. People 22(2): 92-108 (2009) - [c11]John R. Goodall:
Visualization is better! A comparative evaluation. VizSEC 2009: 57-68 - [e3]Deborah A. Frincke, Carrie Gates, John R. Goodall, Robert F. Erbacher:
6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009. IEEE Computer Society 2009 [contents] - 2008
- [c10]Kenneth Prole, John R. Goodall, Anita D. D'Amico, Jason K. Kopylec:
Wireless Cyber Assets Discovery Visualization. VizSEC 2008: 136-143 - [e2]John R. Goodall, Gregory J. Conti, Kwan-Liu Ma:
4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007. Mathematics and Visualization, Springer 2008, ISBN 978-3-540-78242-1 [contents] - [e1]John R. Goodall, Gregory J. Conti, Kwan-Liu Ma:
5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings. Lecture Notes in Computer Science 5210, Springer 2008, ISBN 978-3-540-85931-4 [contents] - 2007
- [j2]Anita D. D'Amico, John R. Goodall, Daniel R. Tesone, Jason K. Kopylec:
Visual Discovery in Computer Network Defense. IEEE Computer Graphics and Applications 27(5): 20-27 (2007) - [c9]Daniel R. Tesone, John R. Goodall:
Balancing Interactive Data Management of Massive Data with Situational Awareness through Smart Aggregation. IEEE VAST 2007: 67-74 - [c8]Jason K. Kopylec, Anita D'Amico, John R. Goodall:
Visualizing Cascading Failures in Critical Cyber Infrastructures. Critical Infrastructure Protection 2007: 351-364 - [c7]John R. Goodall:
Introduction to Visualization for Computer Security. VizSEC 2007: 1-17 - 2006
- [j1]John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi:
Focusing on Context in Network Traffic Analysis. IEEE Computer Graphics and Applications 26(2): 72-80 (2006) - [c6]John R. Goodall:
Visualizing network traffic for intrusion detection. Conference on Designing Interactive Systems 2006: 363-364 - 2005
- [c5]John R. Goodall, A. Ant Ozok, Wayne G. Lutters, Penny Rheingans, Anita Komlodi:
A user-centered approach to visualizing network traffic for intrusion detection. CHI Extended Abstracts 2005: 1403-1406 - [c4]Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John R. Goodall, Amit Joshi:
A User-centered Look at Glyph-based Security Visualization. VizSEC 2005: 3 - [c3]John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi:
Preserving the Big Picture: Visual Network Traffic Analysis with TN. VizSEC 2005: 6 - 2004
- [c2]John R. Goodall, Wayne G. Lutters, Anita Komlodi:
The Work of Intrusion Detection: Rethinking the Role of Security Analysts. AMCIS 2004: 179 - [c1]John R. Goodall, Wayne G. Lutters, Anita Komlodi:
I know my network: collaboration and expertise in intrusion detection. CSCW 2004: 342-345
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint