Preserving the big picture: Visual network traffic analysis with tnv JR Goodall, WG Lutters, P Rheingans, A Komlodi IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 47-54, 2005 | 138 | 2005 |
Dating the Anthropocene: Towards an empirical global history of human transformation of the terrestrial biosphere EC Ellis, DQ Fuller, JO Kaplan, WG Lutters Elementa 1, 000018, 2013 | 124 | 2013 |
I know my network: collaboration and expertise in intrusion detection JR Goodall, WG Lutters, A Komlodi Proceedings of the 2004 ACM conference on Computer supported cooperative …, 2004 | 112 | 2004 |
An introduction to the Chicago School of Sociology WG Lutters, MS Ackerman Interval Research Proprietary 2 (6), 1-25, 1996 | 106 | 1996 |
Achieving safety: A field study of boundary objects in aircraft technical support WG Lutters, MS Ackerman Proceedings of the 2002 ACM conference on Computer supported cooperative …, 2002 | 105 | 2002 |
Understanding the micronote lifecycle: improving mobile support for informal note taking M Lin, WG Lutters, TS Kim Proceedings of the SIGCHI conference on Human factors in computing systems …, 2004 | 104 | 2004 |
Beyond boundary objects: Collaborative reuse in aircraft technical support WG Lutters, MS Ackerman Computer Supported Cooperative Work (CSCW) 16, 341-372, 2007 | 103 | 2007 |
" It's {Scary… It's}{Confusing… It's} Dull": How Cybersecurity Advocates Overcome Negative Perceptions of Security JM Haney, WG Lutters Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 411-425, 2018 | 99 | 2018 |
Developing expertise for network intrusion detection JR Goodall, WG Lutters, A Komlodi Information Technology & People 22 (2), 92-108, 2009 | 92 | 2009 |
The work of intrusion detection: rethinking the role of security analysts J Goodall, W Lutters, A Komlodi | 92 | 2004 |
An information visualization framework for intrusion detection A Komlodi, JR Goodall, WG Lutters CHI'04 extended abstracts on Human factors in computing systems, 1743, 2004 | 82 | 2004 |
Revealing actual documentation usage in software maintenance through war stories WG Lutters, CB Seaman Information and Software Technology 49 (6), 576-587, 2007 | 78 | 2007 |
Focusing on context in network traffic analysis JR Goodall, WG Lutters, P Rheingans, A Komlodi IEEE Computer Graphics and Applications 26 (2), 72-80, 2006 | 72 | 2006 |
Interruptive notifications in support of task management CL Paul, A Komlodi, W Lutters International Journal of Human-Computer Studies 79, 20-34, 2015 | 66 | 2015 |
Mixed reality games EM Bonsignore, DL Hansen, PO Toups Dugas, LE Nacke, A Salter, ... Proceedings of the ACM 2012 conference on computer supported cooperative …, 2012 | 54 | 2012 |
" Girls don't waste time" pre-adolescent attitudes toward ICT W Hou, M Kaur, A Komlodi, WG Lutters, L Boot, SR Cotten, C Morrell, ... CHI'06 extended abstracts on Human factors in computing systems, 875-880, 2006 | 53 | 2006 |
Understanding documentation value in software maintenance S Das, WG Lutters, CB Seaman Proceedings of the 2007 Symposium on Computer human interaction for the …, 2007 | 50 | 2007 |
A user-centered approach to visualizing network traffic for intrusion detection JR Goodall, AA Ozok, WG Lutters, P Rheingans, A Komlodi CHI'05 Extended Abstracts on Human Factors in Computing Systems, 1403-1406, 2005 | 50 | 2005 |
14 Group Information Management WG Lutters, MS Ackerman, X Zhou Personal information management, 236, 2007 | 48 | 2007 |
A content-analysis approach for exploring usability problems in a collaborative virtual environment D Geszten, A Komlódi, K Hercegfi, B Hámornik, A Young, M Köles, ... Springer, 2018 | 47 | 2018 |