Publications : Visualization

/ / Visualization
Visualization 2017-04-27T12:00:23+00:00
14Sep-2010

Visual Analysis of Code Security

Goodall, J. R., Radwan, H., & Halseth, L. (2010, September). Visual analysis of code security. In Proceedings of the seventh international symposium on visualization for cyber security (pp. 46-51). ACM.

11May-2009

VIAssist: Visual Analytics for Cyber Defense

Goodall, J. R., & Sowul, M. (2009, May). VIAssist: Visual analytics for cyber defense. In Technologies for Homeland Security, 2009. HST'09. IEEE Conference on (pp. 143-150). IEEE.

29Mar-2009

Visual Analytics for Network Flow Analysis

Goodall, J. R., & Tesone, D. R. (2009, March). Visual analytics for network flow analysis. In Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications & Technology (pp. 199-204). IEEE.

11Mar-2009

Advances in Topological Vulnerability Analysis

Noel, S., Elder, M., Jajodia, S., Kalapa, P., O'Hare, S., & Prole, K. (2009, March). Advances in topological vulnerability analysis. In Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications & Technology (pp. 124-129). IEEE.

1Sep-2008

Wireless Cyber Assets Discovery Visualization

Prole, K., Goodall, J. R., D’Amico, A. D., & Kopylec, J. K. (2008). Wireless cyber assets discovery visualization. In Visualization for Computer Security (pp. 136-143). Springer Berlin Heidelberg.

1Sep-2007

Visual Discovery in Computer Network Defense

Anita D. D’Amico, John R. Goodall, Daniel R. Tesone and Jason K. Kopylec, “Visual Discovery in Computer Network Defense,” IEEE Computer Graphics and Applications 27(5), IEEE Press, 2007, 20-27.