John R. Goodall

1.4k total citations
44 papers, 876 citations indexed

About

John R. Goodall is a scholar working on Computer Vision and Pattern Recognition, Computer Networks and Communications and Statistical and Nonlinear Physics. According to data from OpenAlex, John R. Goodall has authored 44 papers receiving a total of 876 indexed citations (citations by other indexed papers that have themselves been cited), including 23 papers in Computer Vision and Pattern Recognition, 18 papers in Computer Networks and Communications and 17 papers in Statistical and Nonlinear Physics. Recurrent topics in John R. Goodall's work include Data Visualization and Analytics (23 papers), Complex Network Analysis Techniques (17 papers) and Network Security and Intrusion Detection (17 papers). John R. Goodall is often cited by papers focused on Data Visualization and Analytics (23 papers), Complex Network Analysis Techniques (17 papers) and Network Security and Intrusion Detection (17 papers). John R. Goodall collaborates with scholars based in United States, Hungary and United Kingdom. John R. Goodall's co-authors include Anita Komlódi, Wayne G. Lutters, Penny Rheingans, Robert A. Bridges, Anita D‘Amico, Michael D. Iannacone, Erik M. Ferragut, Eric D. Ragan, John Gerth and Alark Joshi and has published in prestigious journals such as SHILAP Revista de lepidopterología, Journal of the Association for Information Systems and IEEE Transactions on Visualization and Computer Graphics.

In The Last Decade

John R. Goodall

44 papers receiving 797 citations

Peers

John R. Goodall
Aneesh Sharma United States
Jafar Adibi United States
Glenn Fink United States
Abhinandan Das United States
Hasan Davulcu United States
Maria Luisa Sapino United States
Kuiyu Chang Singapore
Aneesh Sharma United States
John R. Goodall
Citations per year, relative to John R. Goodall John R. Goodall (= 1×) peers Aneesh Sharma

Countries citing papers authored by John R. Goodall

Since Specialization
Citations

This map shows the geographic impact of John R. Goodall's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by John R. Goodall with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites John R. Goodall more than expected).

Fields of papers citing papers by John R. Goodall

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by John R. Goodall. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by John R. Goodall. The network helps show where John R. Goodall may publish in the future.

Co-authorship network of co-authors of John R. Goodall

This figure shows the co-authorship network connecting the top 25 collaborators of John R. Goodall. A scholar is included among the top collaborators of John R. Goodall based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with John R. Goodall. John R. Goodall is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Steed, Chad A., John R. Goodall, Junghoon Chae, & Artem A. Trofimov. (2020). CrossVis: A visual analytics system for exploring heterogeneous multivariate data with applications to materials and climate sciences. SHILAP Revista de lepidopterología. 3. 200013–200013. 7 indexed citations
2.
Ragan, Eric D., et al.. (2020). Preserving Contextual Awareness during Selection of Moving Targets in Animated Stream Visualizations. OSTI OAI (U.S. Department of Energy Office of Scientific and Technical Information). 1–9. 1 indexed citations
3.
Goodall, John R., et al.. (2018). Situ: Identifying and Explaining Suspicious Behavior in Networks. IEEE Transactions on Visualization and Computer Graphics. 25(1). 204–214. 44 indexed citations
4.
Czejdo, Bogdan, Michael D. Iannacone, Robert A. Bridges, Erik M. Ferragut, & John R. Goodall. (2014). Integration of external data sources with cyber security data warehouse. 49–52. 2 indexed citations
5.
Czejdo, Bogdan, et al.. (2013). Data Warehouse for Event Streams Violating Rules. Foundations of Computing and Decision Sciences. 38(2). 87–96. 1 indexed citations
6.
Bridges, Robert A., et al.. (2013). PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-security Concepts. DigitalCommons@Fayetteville State University (Fayetteville State University). 60–65. 24 indexed citations
7.
Harrison, Lane, et al.. (2012). situ: Situational understanding and discovery for cyber attacks. 307–308. 7 indexed citations
8.
Steed, Chad A., et al.. (2012). Interactive Visual Analysis of High Throughput Text Streams. OSTI OAI (U.S. Department of Energy Office of Scientific and Technical Information). 4 indexed citations
9.
Goodall, John R.. (2011). An Evaluation of Visual and Textual Network Analysis Tools. Information Visualization. 10(2). 145–157. 5 indexed citations
10.
Goodall, John R., Gregory Conti, & Kwan‐Liu Ma. (2010). VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security. DIAL (Catholic University of Leuven). 273–273. 7 indexed citations
11.
Goodall, John R., Wayne G. Lutters, & Anita Komlódi. (2009). Supporting Intrusion Detection Work Practice. 5(2). 42–73. 2 indexed citations
12.
D‘Amico, Anita, et al.. (2009). Mission Impact of Cyber Events: Scenarios and Ontology to Express the Relationships between Cyber Assets, Missions, and Users. 26 indexed citations
13.
Goodall, John R., et al.. (2009). Visual Analytics for Network Flow Analysis. 199–204. 7 indexed citations
14.
Goodall, John R., Gregory Conti, & Kwan‐Liu Ma. (2008). Proceedings of the 5th international workshop on Visualization for Computer Security. 2 indexed citations
15.
Goodall, John R., et al.. (2008). VizSEC 2007. 2 indexed citations
16.
D‘Amico, Anita, et al.. (2007). Visual Discovery in Computer Network Defense. IEEE Computer Graphics and Applications. 27(5). 20–27. 35 indexed citations
17.
Lutters, Wayne G. & John R. Goodall. (2007). Defending the network: visualizing network traffic for intrusion detection analysis. 2 indexed citations
18.
Goodall, John R., Wayne G. Lutters, Penny Rheingans, & Anita Komlódi. (2006). Focusing on context in network traffic analysis. IEEE Computer Graphics and Applications. 26(2). 72–80. 28 indexed citations
19.
Goodall, John R., Wayne G. Lutters, & Anita Komlódi. (2004). The Work of Intrusion Detection: Rethinking the Role of Security Analysts. Journal of the Association for Information Systems. 179. 53 indexed citations
20.
Goodall, John R., Wayne G. Lutters, & Anita Komlódi. (2004). I know my network. 342–345. 57 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026