John R. Goodall, Ph.D.
Affiliations: | 2007 | Information Systems | University of Maryland, Baltimore County, Baltimore, MD, United States |
Area:
Information Science, Computer ScienceGoogle:
"John Goodall"Parents
Sign in to add mentorWayne Lutters | grad student | 2007 | UMBC | |
(Defending the network: Visualizing network traffic for intrusion detection analysis.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Goodall JR, Ragan ED, Steed CA, et al. (2018) Situ: Identifying and Explaining Suspicious Behavior in Networks. Ieee Transactions On Visualization and Computer Graphics |
Harshaw CR, Bridges RA, Iannacone MD, et al. (2016) GraphPrints: Towards a graph analytic method for network anomaly detection Proceedings of the 11th Annual Cyber and Information Security Research Conference, Cisrc 2016 |
Jones CL, Bridges RA, Huffer KMT, et al. (2015) Towards a relation extraction framework for cyber-security concepts Acm International Conference Proceeding Series. 6 |
Harrison L, Spahn R, Iannacone M, et al. (2012) NV: Nessus vulnerability visualization for the web Acm International Conference Proceeding Series. 25-32 |
Goodall JR, Mansmann F, Gerth J. (2012) Computer network visualization Ieee Network. 26: 4-5 |
Goodall JR. (2011) An evaluation of visual and textual network analysis tools Information Visualization. 10: 145-157 |
Goodall JR, Sowul M. (2009) VIAssist: Visual analytics for cyber defense 2009 Ieee Conference On Technologies For Homeland Security, Hst 2009. 143-150 |
Goodall JR, Lutters WG, Komlodi A. (2009) Developing expertise for network intrusion detection Information Technology and People. 22: 92-108 |
Prole K, Goodall JR, D'Amico AD, et al. (2008) Wireless cyber assets discovery visualization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5210: 136-143 |
Goodall JR. (2008) Introduction to visualization for computer security Mathematics and Visualization. 1-17 |