SlideShare a Scribd company logo
1 of 19
Planning and Dependency
Reasoning
Dr. Brian Drabble,
Chief Technology Officer,
DMM Ventures, Inc.,
brian@dmmventures.com
DMM Ventures, Inc: Propritary
Dependency and Consequence Analysis
• Dependency Analysis (Athena)
– Nodes depend upon each other for capabilities, which
are the most dependent nodes in the network?
• Consequence Analysis (Athena)
– Node capabilities can be affected by actions what
would be the consequences of actions?
• Plan Development (NETPlan)
– Develop plans to bring about a desired effect in the
network
• Integrating Planning and Analysis (Cassandra)
2
Cassandra: Insurgent Scenario
• Identify and rank most dependent nodes in
the insurgency network
• Develop Plan Specification
• Develop Plan using NETPlan
• Integrate Plan into Dependency Network
• Analyze Plan effects, direct and n-order
• Analyze Plan robustness and re-task
DMM Ventures, Inc: Propritary 3
DMM Ventures, Inc: Propritary 4
DMM Ventures, Inc: Propritary 5
DMM Ventures, Inc: Propritary 6
DMM Ventures, Inc: Propritary 7
DMM Ventures, Inc: Propritary 8
DMM Ventures, Inc: Propritary 9
DMM Ventures, Inc: Propritary 10
DMM Ventures, Inc: Propritary 11
DMM Ventures, Inc: Propritary 12
DMM Ventures, Inc: Propritary 13
DMM Ventures, Inc: Propritary 14
DMM Ventures, Inc: Propritary 15
DMM Ventures, Inc: Propritary 16
DMM Ventures, Inc: Propritary 17
DMM Ventures, Inc: Propritary 18
DMM Ventures, Inc: Propritary 19

More Related Content

Viewers also liked

Pricing challenges and models for consumer goods companies
Pricing challenges and models for consumer goods companiesPricing challenges and models for consumer goods companies
Pricing challenges and models for consumer goods companiessteverogers2015
 
Philosophers, Consultants and Containers
Philosophers, Consultants and ContainersPhilosophers, Consultants and Containers
Philosophers, Consultants and ContainersWeaveworks
 
SAM CV
SAM CVSAM CV
SAM CVS M
 
How to Sell to Multiple Decision Makers
How to Sell to Multiple Decision MakersHow to Sell to Multiple Decision Makers
How to Sell to Multiple Decision MakersSales Readiness Group
 
Weave - Containers Across Clouds - Edinburgh Docker Meetup, July 2015
Weave - Containers Across Clouds - Edinburgh Docker Meetup, July 2015Weave - Containers Across Clouds - Edinburgh Docker Meetup, July 2015
Weave - Containers Across Clouds - Edinburgh Docker Meetup, July 2015Weaveworks
 
ThomasPatrickCraftsmanship_sml
ThomasPatrickCraftsmanship_smlThomasPatrickCraftsmanship_sml
ThomasPatrickCraftsmanship_smlPatrick Crowther
 
Baylor Bearathon TCP 2015
Baylor Bearathon TCP 2015Baylor Bearathon TCP 2015
Baylor Bearathon TCP 2015Johnny Greer
 

Viewers also liked (11)

Pricing challenges and models for consumer goods companies
Pricing challenges and models for consumer goods companiesPricing challenges and models for consumer goods companies
Pricing challenges and models for consumer goods companies
 
Imran Resume
Imran ResumeImran Resume
Imran Resume
 
Philosophers, Consultants and Containers
Philosophers, Consultants and ContainersPhilosophers, Consultants and Containers
Philosophers, Consultants and Containers
 
C4orf26(2012)
C4orf26(2012)C4orf26(2012)
C4orf26(2012)
 
SAM CV
SAM CVSAM CV
SAM CV
 
LAMB3(2014)
LAMB3(2014)LAMB3(2014)
LAMB3(2014)
 
How to Sell to Multiple Decision Makers
How to Sell to Multiple Decision MakersHow to Sell to Multiple Decision Makers
How to Sell to Multiple Decision Makers
 
resume 2014
resume 2014resume 2014
resume 2014
 
Weave - Containers Across Clouds - Edinburgh Docker Meetup, July 2015
Weave - Containers Across Clouds - Edinburgh Docker Meetup, July 2015Weave - Containers Across Clouds - Edinburgh Docker Meetup, July 2015
Weave - Containers Across Clouds - Edinburgh Docker Meetup, July 2015
 
ThomasPatrickCraftsmanship_sml
ThomasPatrickCraftsmanship_smlThomasPatrickCraftsmanship_sml
ThomasPatrickCraftsmanship_sml
 
Baylor Bearathon TCP 2015
Baylor Bearathon TCP 2015Baylor Bearathon TCP 2015
Baylor Bearathon TCP 2015
 

Similar to Planning and Dependency Reasoning

Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...Shakas Technologies
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021Mouaz Alnouri
 
Ista presentation-dga
Ista presentation-dgaIsta presentation-dga
Ista presentation-dgavinaykumar R
 
How Graph Technology is Changing AI
How Graph Technology is Changing AIHow Graph Technology is Changing AI
How Graph Technology is Changing AIDatabricks
 
Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Savvius, Inc
 
Internet of Things: Government Keynote, Randy Garrett
Internet of Things: Government Keynote, Randy GarrettInternet of Things: Government Keynote, Randy Garrett
Internet of Things: Government Keynote, Randy GarrettGovLoop
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPROIDEA
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliMarta Pacyga
 
Ista presentation-apache spark
Ista presentation-apache sparkIsta presentation-apache spark
Ista presentation-apache sparkvinaykumar R
 
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial EmulationScott Sutherland
 
GraphTour 2020 - Graphs & AI: A Path for Data Science
GraphTour 2020 - Graphs & AI: A Path for Data ScienceGraphTour 2020 - Graphs & AI: A Path for Data Science
GraphTour 2020 - Graphs & AI: A Path for Data ScienceNeo4j
 
Mris network architecture proposal r1
Mris network architecture proposal r1Mris network architecture proposal r1
Mris network architecture proposal r1Craig Burma
 
Data Tactics Semantic and Interoperability Summit Feb 12, 2013
Data Tactics Semantic and Interoperability Summit Feb 12, 2013Data Tactics Semantic and Interoperability Summit Feb 12, 2013
Data Tactics Semantic and Interoperability Summit Feb 12, 2013DataTactics
 
Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network
Why the DoD Uses Advanced Network-traffic Analytics to Secure its NetworkWhy the DoD Uses Advanced Network-traffic Analytics to Secure its Network
Why the DoD Uses Advanced Network-traffic Analytics to Secure its NetworkNovetta
 
DT Company Overview January 2013
DT Company Overview January 2013DT Company Overview January 2013
DT Company Overview January 2013DataTactics
 
Building Hybrid DApps using Blockchain Tactics - The Meta-Transaction Example...
Building Hybrid DApps using Blockchain Tactics - The Meta-Transaction Example...Building Hybrid DApps using Blockchain Tactics - The Meta-Transaction Example...
Building Hybrid DApps using Blockchain Tactics - The Meta-Transaction Example...Florian Blum
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosStenio Fernandes
 
Varshneya samdarshi lmu_symposium_2016
Varshneya samdarshi lmu_symposium_2016Varshneya samdarshi lmu_symposium_2016
Varshneya samdarshi lmu_symposium_2016GRNsight
 
Applicability of Machine learning in computer networks
Applicability of Machine learning in computer networksApplicability of Machine learning in computer networks
Applicability of Machine learning in computer networksChetan Kumar S
 

Similar to Planning and Dependency Reasoning (20)

Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021
 
Ista presentation-dga
Ista presentation-dgaIsta presentation-dga
Ista presentation-dga
 
How Graph Technology is Changing AI
How Graph Technology is Changing AIHow Graph Technology is Changing AI
How Graph Technology is Changing AI
 
Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?
 
Internet of Things: Government Keynote, Randy Garrett
Internet of Things: Government Keynote, Randy GarrettInternet of Things: Government Keynote, Randy Garrett
Internet of Things: Government Keynote, Randy Garrett
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
Ista presentation-apache spark
Ista presentation-apache sparkIsta presentation-apache spark
Ista presentation-apache spark
 
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
 
GraphTour 2020 - Graphs & AI: A Path for Data Science
GraphTour 2020 - Graphs & AI: A Path for Data ScienceGraphTour 2020 - Graphs & AI: A Path for Data Science
GraphTour 2020 - Graphs & AI: A Path for Data Science
 
Mris network architecture proposal r1
Mris network architecture proposal r1Mris network architecture proposal r1
Mris network architecture proposal r1
 
Data Tactics Semantic and Interoperability Summit Feb 12, 2013
Data Tactics Semantic and Interoperability Summit Feb 12, 2013Data Tactics Semantic and Interoperability Summit Feb 12, 2013
Data Tactics Semantic and Interoperability Summit Feb 12, 2013
 
Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network
Why the DoD Uses Advanced Network-traffic Analytics to Secure its NetworkWhy the DoD Uses Advanced Network-traffic Analytics to Secure its Network
Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network
 
DT Company Overview January 2013
DT Company Overview January 2013DT Company Overview January 2013
DT Company Overview January 2013
 
Building Hybrid DApps using Blockchain Tactics - The Meta-Transaction Example...
Building Hybrid DApps using Blockchain Tactics - The Meta-Transaction Example...Building Hybrid DApps using Blockchain Tactics - The Meta-Transaction Example...
Building Hybrid DApps using Blockchain Tactics - The Meta-Transaction Example...
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
 
Varshneya samdarshi lmu_symposium_2016
Varshneya samdarshi lmu_symposium_2016Varshneya samdarshi lmu_symposium_2016
Varshneya samdarshi lmu_symposium_2016
 
Applicability of Machine learning in computer networks
Applicability of Machine learning in computer networksApplicability of Machine learning in computer networks
Applicability of Machine learning in computer networks
 
SDN-ppt-new
SDN-ppt-newSDN-ppt-new
SDN-ppt-new
 

Planning and Dependency Reasoning