• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Examples for leverage points

Examples for leverage points






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment
  • What is good about the fact that the Origins and destinations are in two separate maps:- clearly show the flow directions (origin->destination) this is not always obvious in cluttered flow maps- potentially use other appropriate representations for the temporal data without being constrained by having to fit it into a map
  • Like edge bundling, for example,But for us the real challenge is differentWe want to be able to visualize and explore the temporal dimension along with the origins and destinations(embed temporal data into it without adding even more clutter)
  • For Outstanding Creative Design – Spring Rain, a student team from Purdue UniversitySpring Rain was a very interesting concept for Ambient display that shows the important things going on in the network now at a glance without having to do in-depth analysis, which is really key.
  • For Outstanding Creative Design – Solar Wheels, another student team from Purdue University. I should note that both Purdue teams were made up of computer scientists and designersSolar Wheels was very interesting because of the way it used physical navigation to provide an appropriate level of information.
  • SASInteresting Visualization Technique for their integration between two types of matrices
  • From submission:Event 9: Eight suspicious internal hosts and SSH protocol activity from 8:00 April 12th to 5:00 April 15thAt 8:14 April 12th, eight suspicious internal hosts accessed external host which has only appeared once in the log. Beginning from 8:28 April 12th, these eight internal hosts started accessing the port 22 of external host regularly and the accessing number to is much larger than that to other workstations. Also, these internal hosts once have accessed and server has accessed Hence these eight internal hosts,,,,,,,,, are noteworthy (see Figure 9).This screen identifies a correct answer. It finds the command and control communication with the botnet.This solution chose several good cyber to visual mappings and they had the highest overall accuracy.
  • Team had one integrated display. Used entropy calculations to help analyst know where to look. Not a set of separate views but a single display. Mention the award is for outstanding situation awareness because the vises are brought together in one integrated display.

Examples for leverage points Examples for leverage points Presentation Transcript