Developing expertise for network intrusion detection
Goodall, John R., Lutters, Wayne G., Komlodi, Anita
Published in Information technology & people (West Linn, Or.) (05.06.2009)
Published in Information technology & people (West Linn, Or.) (05.06.2009)
Get full text
Journal Article
Situ: Identifying and Explaining Suspicious Behavior in Networks
Goodall, John R., Ragan, Eric D., Steed, Chad A., Reed, Joel W., Richardson, G. David, Huffer, Kelly M.T., Bridges, Robert A., Laska, Jason A.
Published in IEEE transactions on visualization and computer graphics (01.01.2019)
Published in IEEE transactions on visualization and computer graphics (01.01.2019)
Get full text
Journal Article
The Influence of Visual Provenance Representations on Strategies in a Collaborative Hand-off Data Analysis Scenario
Block, Jeremy E., Esmaeili, Shaghayegh, Ragan, Eric D., Goodall, John R., Richardson, G. David
Published in IEEE transactions on visualization and computer graphics (01.01.2023)
Published in IEEE transactions on visualization and computer graphics (01.01.2023)
Get full text
Journal Article
PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-security Concepts
McNeil, Nikki, Bridges, Robert A., Iannacone, Michael D., Czejdo, Bogdan, Perez, Nicolas, Goodall, John R.
Published in 2013 12th International Conference on Machine Learning and Applications (01.12.2013)
Published in 2013 12th International Conference on Machine Learning and Applications (01.12.2013)
Get full text
Conference Proceeding
Visual Analytics for Network Flow Analysis
Goodall, J.R., Tesone, D.R.
Published in 2009 Cybersecurity Applications & Technology Conference for Homeland Security (01.03.2009)
Published in 2009 Cybersecurity Applications & Technology Conference for Homeland Security (01.03.2009)
Get full text
Conference Proceeding
Data Warehouse for Event Streams Violating Rules
Czejdo, Bogdan Denny, Ferragut, Erik M., Goodall, John R., Laska, Jason
Published in Foundations of computing and decision sciences (01.06.2013)
Published in Foundations of computing and decision sciences (01.06.2013)
Get full text
Journal Article
Camus: Automatically mapping Cyber Assets to Missions and Users
Goodall, J.R., D'Amico, A., Kopylec, J.K.
Published in MILCOM 2009 - 2009 IEEE Military Communications Conference (01.10.2009)
Published in MILCOM 2009 - 2009 IEEE Military Communications Conference (01.10.2009)
Get full text
Conference Proceeding
The Influence of Visual Provenance Representations on Strategies in a Collaborative Hand-off Data Analysis Scenario
Block, Jeremy E, Esmaeili, Shaghayegh, Ragan, Eric D, Goodall, John R, Richardson, G David
Published in arXiv.org (08.08.2022)
Published in arXiv.org (08.08.2022)
Get full text
Paper
Journal Article
Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors
Bridges, Robert A., Huffer, Kelly M. T., Jones, Corinne L., Iannacone, Michael D., Goodall, John R.
Published in 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA) (01.12.2017)
Published in 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA) (01.12.2017)
Get full text
Conference Proceeding
Visualization is better! A comparative evaluation
Goodall, J.R.
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Get full text
Conference Proceeding
How do information security workers use host data? A summary of interviews with security analysts
Bridges, Robert A, Iannacone, Michael D, Goodall, John R, Beaver, Justin M
Year of Publication 06.12.2018
Year of Publication 06.12.2018
Get full text
Journal Article
Forming IDEAS Interactive Data Exploration & Analysis System
Bridges, Robert A, Vincent, Maria A, Huffer, Kelly M. T, Goodall, John R, Jamieson, Jessie D, Burch, Zachary
Year of Publication 24.05.2018
Year of Publication 24.05.2018
Get full text
Journal Article
Visual Discovery in Computer Network Defense
D'Amico, Anita D., Goodall, John R., Tesone, Daniel R., Kopylec, Jason K.
Published in IEEE computer graphics and applications (01.09.2007)
Published in IEEE computer graphics and applications (01.09.2007)
Get full text
Magazine Article
GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection
Harshaw, Christopher R, Bridges, Robert A, Iannacone, Michael D, Reed, Joel W, Goodall, John R
Published in arXiv.org (02.02.2016)
Published in arXiv.org (02.02.2016)
Get full text
Paper
Journal Article