John R. Goodall

Orcid: 0000-0001-6810-4517

According to our database1, John R. Goodall authored at least 37 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The Influence of Visual Provenance Representations on Strategies in a Collaborative Hand-off Data Analysis Scenario.
IEEE Trans. Vis. Comput. Graph., 2023

2020
CrossVis: A visual analytics system for exploring heterogeneous multivariate data with applications to materials and climate sciences.
Graph. Vis. Comput., 2020

An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

Empirical Study of Focus-Plus-Context and Aggregation Techniques for the Visualization of Streaming Data.
Proceedings of the AVI '20: International Conference on Advanced Visual Interfaces, Island of Ischia, Italy, September 28, 2020

Preserving Contextual Awareness during Selection of Moving Targets in Animated Stream Visualizations.
Proceedings of the AVI '20: International Conference on Advanced Visual Interfaces, Island of Ischia, Italy, September 28, 2020

2019
Situ: Identifying and Explaining Suspicious Behavior in Networks.
IEEE Trans. Vis. Comput. Graph., 2019

Dynamic Color Mapping with a Multi-Scale Histogram: A Design Study with Physical Scientists.
Proceedings of the Visualization and Data Analysis 2019, 2019

2018
How do information security workers use host data? A summary of interviews with security analysts.
CoRR, 2018

Forming IDEAS Interactive Data Exploration & Analysis System.
CoRR, 2018

2017
Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

2016
GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
Towards a Relation Extraction Framework for Cyber-Security Concepts.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

Developing an Ontology for Cyber Security Knowledge Graphs.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

Evaluating How Level of Detail of Visual History Affects Process Memory.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Integration of external data sources with cyber security data warehouse.
Proceedings of the Cyber and Information Security Research Conference, 2014

Evaluation methodology for comparing memory and communication of analytic processes in visual analytics.
Proceedings of the Fifth Workshop on Beyond Time and Errors: Novel Evaluation Methods for Visualization, 2014

2013
Automatic Labeling for Entity Extraction in Cyber Security.
CoRR, 2013

PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-security Concepts.
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013

2012
Computer network visualization [Guest Editorial].
IEEE Netw., 2012

NV: Nessus vulnerability visualization for the web.
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012

situ: Situational understanding and discovery for cyber attacks.
Proceedings of the 7th IEEE Conference on Visual Analytics Science and Technology, 2012

2011
An Evaluation of Visual and Textual Network Analysis Tools.
Inf. Vis., 2011

2010
Visual analysis of code security.
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010

2009
Developing expertise for network intrusion detection.
Inf. Technol. People, 2009

Visualization is better! A comparative evaluation.
Proceedings of the 6th International Workshop on Visualization for Cyber Security, 2009

2008
Wireless Cyber Assets Discovery Visualization.
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008

2007
Visual Discovery in Computer Network Defense.
IEEE Computer Graphics and Applications, 2007

Introduction to Visualization for Computer Security.
Proceedings of the 4th International Workshop on Visualization for Computer Security, 2007

Visualizing Cascading Failures in Critical Cyber Infrastructures.
Proceedings of the Critical Infrastructure Protection, 2007

Balancing Interactive Data Management of Massive Data with Situational Awareness through Smart Aggregation.
Proceedings of the 2nd IEEE Symposium on Visual Analytics Science and Technology, 2007

2006
Focusing on Context in Network Traffic Analysis.
IEEE Computer Graphics and Applications, 2006

Visualizing network traffic for intrusion detection.
Proceedings of the Conference on Designing Interactive Systems, 2006

2005
A User-centered Look at Glyph-based Security Visualization.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005

Preserving the Big Picture: Visual Network Traffic Analysis with TN.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005

A user-centered approach to visualizing network traffic for intrusion detection.
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

2004
I know my network: collaboration and expertise in intrusion detection.
Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work, 2004

The Work of Intrusion Detection: Rethinking the Role of Security Analysts.
Proceedings of the 10th Americas Conference on Information Systems, 2004


  Loading...