EuroVA14
Permanent URI for this collection
Browse
Browsing EuroVA14 by Subject "Application"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Interactively Visualizing Summaries of Rules and Exceptions(The Eurographics Association, 2014) Sharma, Geetika; Shroff, Gautam; Pandey, Aditeya; Agarwal, Puneet; Srinivasan, Ashwin; M. Pohl and J. RobertsRules along with their exceptions have been used to explain large data sets in a comprehensible manner. In this paper we describe an interactive visualization scheme for rules and their exceptions. Our visual encoding is based on principles for creating perceptually effective visualizations from literature. Our visualization scheme presents an overview first, allows semantic zooming and then shows details on demand using established principles of interactive visualization. We assume that rules and exceptions have been mined and summarized using available techniques; however our visualization is applicable for more general rule hierarchies as well. We illustrate our visualization using rules and exceptions extracted from real customer surveys as well as on rule sets derived from past literature.Item A Visual Analytics Field Experiment to Evaluate Alternative Visualizations for Cyber Security Applications(The Eurographics Association, 2014) Fischer, Fabian; Davey, James; Fuchs, Johannes; Thonnard, Olivier; Kohlhammer, Jörn; Keim, Daniel A.; M. Pohl and J. RobertsThe analysis and exploration of emerging threats in the Internet is important to better understand the behaviour of attackers and develop new methods to enhance cyber security. Fully automated algorithms alone are often not capable of providing actionable insights about the threat landscape. We therefore combine a multi-criteria clustering algorithm, tailor-made for the identification of such attack campaigns with three interactive visualizations, namely treemap representations, interactive node-link diagrams, and chord diagrams, to allow the analysts to visually explore and make sense of the resulting multi-dimensional clusters. To demonstrate the potential of the system, we share our lessons learned in conducting a field experiment with experts in a security response team and show how it helped them to gain new insights into various threat landscapes.