Følg
John Goodall
Tittel
Sitert av
Sitert av
År
Developing an ontology for cyber security knowledge graphs
M Iannacone, S Bohn, G Nakamura, J Gerth, K Huffer, R Bridges, ...
Proceedings of the 10th annual cyber and information security research …, 2015
2062015
Preserving the big picture: Visual network traffic analysis with tnv
JR Goodall, WG Lutters, P Rheingans, A Komlodi
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 47-54, 2005
1412005
Automatic labeling for entity extraction in cyber security
RA Bridges, CL Jones, MD Iannacone, KM Testa, JR Goodall
arXiv preprint arXiv:1308.4941, 2013
1372013
Towards a relation extraction framework for cyber-security concepts
CL Jones, RA Bridges, KMT Huffer, JR Goodall
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
1242015
I know my network: collaboration and expertise in intrusion detection
JR Goodall, WG Lutters, A Komlodi
Proceedings of the 2004 ACM conference on Computer supported cooperative …, 2004
1182004
Developing expertise for network intrusion detection
JR Goodall, WG Lutters, A Komlodi
Information Technology & People 22 (2), 92-108, 2009
982009
Situ: Identifying and explaining suspicious behavior in networks
JR Goodall, ED Ragan, CA Steed, JW Reed, GD Richardson, KMT Huffer, ...
IEEE transactions on visualization and computer graphics 25 (1), 204-214, 2018
962018
The work of intrusion detection: rethinking the role of security analysts
J Goodall, W Lutters, A Komlodi
922004
An information visualization framework for intrusion detection
A Komlodi, JR Goodall, WG Lutters
CHI'04 extended abstracts on Human factors in computing systems, 1743, 2004
852004
A user-centered look at glyph-based security visualization
A Komlodi, P Rheingans, U Ayachit, JR Goodall, A Joshi
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 21-28, 2005
822005
Focusing on context in network traffic analysis
JR Goodall, WG Lutters, P Rheingans, A Komlodi
IEEE Computer Graphics and Applications 26 (2), 72-80, 2006
722006
Real-time detection and classification of anomalous events in streaming data
EM Ferragut, JR Goodall, MD Iannacone, JA Laska, LT Harrison
US Patent 9,319,421, 2016
672016
Camus: automatically mapping cyber assets to missions and users
JR Goodall, A D'Amico, JK Kopylec
MILCOM 2009-2009 IEEE Military Communications Conference, 1-7, 2009
672009
Visualization is better! A comparative evaluation
JR Goodall
2009 6th International Workshop on Visualization for Cyber Security, 57-68, 2009
622009
Introduction to visualization for computer security
JR Goodall
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer …, 2008
622008
Visual analysis of code security
JR Goodall, H Radwan, L Halseth
Proceedings of the seventh international symposium on visualization for …, 2010
592010
VIAssist: Visual analytics for cyber defense
JR Goodall, M Sowul
2009 IEEE conference on technologies for homeland security, 143-150, 2009
592009
Visual discovery in computer network defense
AD D'Amico, JR Goodall, DR Tesone, JK Kopylec
IEEE Computer Graphics and Applications 27 (5), 20-27, 2007
592007
Pace: Pattern accurate computationally efficient bootstrapping for timely discovery of cyber-security concepts
N McNeil, RA Bridges, MD Iannacone, B Czejdo, N Perez, JR Goodall
2013 12th International Conference on Machine Learning and Applications 2, 60-65, 2013
582013
MISSION IMPACT OF CYBER EVENTS: SCENARIOS AND ONTOLOGY TO EXPRESS THE RELATIONSHIPS BETWEEN CYBER ASSETS, MISSIONS, AND USERS (PREPRINT)
A D’Amico, L Buchanan, J Goodall, P Walczak
542009
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20