John R. Goodall, Ph.D.

Affiliations: 
2007 Information Systems University of Maryland, Baltimore County, Baltimore, MD, United States 
Area:
Information Science, Computer Science
Google:
"John Goodall"

Parents

Sign in to add mentor
Wayne Lutters grad student 2007 UMBC
 (Defending the network: Visualizing network traffic for intrusion detection analysis.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Goodall JR, Ragan ED, Steed CA, et al. (2018) Situ: Identifying and Explaining Suspicious Behavior in Networks. Ieee Transactions On Visualization and Computer Graphics
Harshaw CR, Bridges RA, Iannacone MD, et al. (2016) GraphPrints: Towards a graph analytic method for network anomaly detection Proceedings of the 11th Annual Cyber and Information Security Research Conference, Cisrc 2016
Jones CL, Bridges RA, Huffer KMT, et al. (2015) Towards a relation extraction framework for cyber-security concepts Acm International Conference Proceeding Series. 6
Harrison L, Spahn R, Iannacone M, et al. (2012) NV: Nessus vulnerability visualization for the web Acm International Conference Proceeding Series. 25-32
Goodall JR, Mansmann F, Gerth J. (2012) Computer network visualization Ieee Network. 26: 4-5
Goodall JR. (2011) An evaluation of visual and textual network analysis tools Information Visualization. 10: 145-157
Goodall JR, Sowul M. (2009) VIAssist: Visual analytics for cyber defense 2009 Ieee Conference On Technologies For Homeland Security, Hst 2009. 143-150
Goodall JR, Lutters WG, Komlodi A. (2009) Developing expertise for network intrusion detection Information Technology and People. 22: 92-108
Prole K, Goodall JR, D'Amico AD, et al. (2008) Wireless cyber assets discovery visualization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5210: 136-143
Goodall JR. (2008) Introduction to visualization for computer security Mathematics and Visualization. 1-17
See more...