Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dustin Arendt is active.

Publication


Featured researches published by Dustin Arendt.


visualization for computer security | 2015

Ocelot: user-centered design of a decision support visualization for network quarantine

Dustin Arendt; Russ Burtner; Daniel M. Best; Nathan Bos; John Gersh; Christine D. Piatko; Celeste Lyn Paul

Most cyber security research is focused on detecting network intrusions or anomalies through the use of automated methods, exploratory visual analytics systems, or real-time monitoring using dynamic visual representations. However, there has been minimal investigation of effective decision support systems for cyber analysts. This paper describes the user-centered design and development of a decision support visualization for active network defense. Ocelot helps the cyber analyst assess threats to a network and quarantine affected computers from the healthy parts of a network. The described web-based, functional visualization prototype integrates and visualizes multiple data sources through the use of a hybrid space partitioning tree and node link diagram. We describe our design process for requirements gathering and design feedback which included expert interviews, iterative design, and a user study.


Computational and Mathematical Organization Theory | 2015

Opinions, influence, and zealotry: a computational study on stubbornness

Dustin Arendt; Leslie M. Blaha

We present a simple, efficient, and predictive model for opinion dynamics with zealots. Our model captures curvature-driven dynamics (e.g., clear, smooth boundaries separating domains whose curvature decreases over time) through a simple, individual rule, providing a method for rapidly testing basic hypotheses about innovation diffusion, opinion dynamics, and related phenomena. Our model belongs to a class of models called dimer automata, which are asynchronous, graph-based (i.e., non-uniform lattice) variants of cellular automata. Individuals in the model update their states via a dyadic update rule; population opinion dynamics emerge from these pairwise interactions. Zealots are stubborn individuals whose opinion is not susceptible to influence by others. We observe experimentally that a system without zealots usually converges to the majority opinion, but a relatively small number of zealots can sway the opinion of the whole population. The influence of zealots can be further increased by placing zealots at more effective locations within the network. These locations can be determined by rankings from standard social network analysis metrics, or by using a greedy algorithm for influence maximization. We apply the influence maximization technique to a politically polarized social network to explore opinion dynamics in a real-world network and to gain insight about influence and political entrenchment through the zealot model’s ability to sway the entire network to one side or the other.


visualization for computer security | 2016

CyberPetri at CDX 2016: Real-time network situation awareness

Dustin Arendt; Daniel M. Best; Russ Burtner; Celeste Lyn Paul

CyberPetri is a novel visualization technique that provides a flexible map of the network based on available characteristics, such as IP address, operating system, or service. Previous work introduced CyberPetri as a visualization feature in Ocelot, a network defense tool that helped security analysts understand and respond to an active defense scenario. In this paper we present a case study in which we use CyberPetri to support real-time situation awareness during the 2016 Cyber Defense Exercise.


international conference on augmented cognition | 2017

CHISSL: A Human-Machine Collaboration Space for Unsupervised Learning

Dustin Arendt; Caner Komurlu; Leslie M. Blaha

We developed CHISSL, a human-machine interface that utilizes interactive supervision to help the user group unlabeled instances by her own mental model. The user primarily interacts via correction (moving a misplaced instance into its correct group) or confirmation (accepting that an instance is placed in its correct group). Concurrent with the user’s interactions, CHISSL trains a classification model guided by the user’s grouping of the data. It then predicts the group of unlabeled instances and arranges some of these alongside the instances manually organized by the user. We hypothesize that this mode of human and machine collaboration is more effective than Active Learning, wherein the machine decides for itself which instances should be labeled by the user. We found supporting evidence for this hypothesis in a pilot study where we applied CHISSL to organize a collection of handwritten digits.


social informatics | 2016

Contrasting Public Opinion Dynamics and Emotional Response During Crisis

Svitlana Volkova; Ilia Chetviorkin; Dustin Arendt; Benjamin Van Durme

We propose an approach for contrasting spatiotemporal dynamics of public opinions expressed toward targeted entities, also known as stance detection task, in Russia and Ukraine during crisis. Our analysis relies on a novel corpus constructed from posts on the VKontakte social network, centered on local public opinion of the ongoing Russian-Ukrainian crisis, along with newly annotated resources for predicting expressions of fine-grained emotions including joy, sadness, disgust, anger, surprise and fear. Akin to prior work on sentiment analysis we align traditional public opinion polls with aggregated automatic predictions of sentiments for contrastive geo-locations. We report interesting observations on emotional response and stance variations across geo-locations. Some of our findings contradict stereotypical misconceptions imposed by media, for example, we found posts from Ukraine that do not support Euromaidan but support Putin, and posts from Russia that are against Putin but in favor USA. Furthermore, we are the first to demonstrate contrastive stance variations over time across geo-locations using storyline visualization (Storyline visualization is available at http://www.cs.jhu.edu/~svitlana/) technique.


2016 IEEE Second Workshop on Eye Tracking and Visualization (ETVIS) | 2016

Storyline visualizations of eye tracking of movie viewing

J. Timothy Balint; Dustin Arendt; Leslie M. Blaha

Storyline visualization is a technique that captures the spatiotemporal characteristics of individual entities and simultaneously illustrates emerging group behaviors. We developed a storyline visualization leveraging dynamic time warping to parse and cluster eye tracking sequences. Visualization of the results captures the similarities and differences across a group of observers performing acommontask. Weappliedourstorylineapproachtogazepatterns of people watching dynamic movie clips. We use these to illustrate variations in the spatio-temporal patterns of observers as captured by different data encoding techniques. We illustrate that storylines further aid in the identification of modal patterns and noteworthy individual differences within a corpus of eye tracking data.


meeting of the association for computational linguistics | 2017

Intrinsic and Extrinsic Evaluation of Spatiotemporal Text Representations in Twitter Streams

Lawrence Phillips; Kyle Shaffer; Dustin Arendt; Nathan O. Hodas; Svitlana Volkova

Language in social media is a dynamic system, constantly evolving and adapting, with words and concepts rapidly emerging, disappearing, and changing their meaning. These changes can be estimated using word representations in context, over time and across locations. A number of methods have been proposed to track these spatiotemporal changes but no general method exists to evaluate the quality of these representations. Previous work largely focused on qualitative evaluation, which we improve by proposing a set of visualizations that highlight changes in text representation over both space and time. We demonstrate usefulness of novel spatiotemporal representations to explore and characterize specific aspects of the corpus of tweets collected from European countries over a two-week period centered around the terrorist attacks in Brussels in March 2016. In addition, we quantitatively evaluate spatiotemporal representations by feeding them into a downstream classification task – event type prediction. Thus, our work is the first to provide both intrinsic (qualitative) and extrinsic (quantitative) evaluation of text representations for spatiotemporal trends.


Computer Graphics Forum | 2018

Human Factors in Streaming Data Analysis: Challenges and Opportunities for Information Visualization

Aritra Dasgupta; Dustin Arendt; Lyndsey Franklin; Pak Chung Wong; Kristin A. Cook

Real‐world systems change continuously. In domains such as traffic monitoring or cyber security, such changes occur within short time scales. This results in a streaming data problem and leads to unique challenges for the human in the loop, as analysts have to ingest and make sense of dynamic patterns in real time. While visualizations are being increasingly used by analysts to derive insights from streaming data, we lack a thorough characterization of the human‐centred design problems and a critical analysis of the state‐of‐the‐art solutions that exist for addressing these problems. In this paper, our goal is to fill this gap by studying how the state of the art in streaming data visualization handles the challenges and reflect on the gaps and opportunities. To this end, we have three contributions in this paper: (i) problem characterization for identifying domain‐specific goals and challenges for handling streaming data, (ii) a survey and analysis of the state of the art in streaming data visualization research with a focus on how visualization design meets challenges specific to change perception and (iii) reflections on the design trade‐offs, and an outline of potential research directions for addressing the gaps in the state of the art.


meeting of the association for computational linguistics | 2017

ESTEEM: A Novel Framework for Qualitatively Evaluating and Visualizing Spatiotemporal Embeddings in Social Media

Dustin Arendt; Svitlana Volkova

Analyzing and visualizing large amounts of social media communications and contrasting short-term conversation changes over time and geolocations is extremely important for commercial and government applications. Earlier approaches for largescale text stream summarization used dynamic topic models and trending words. Instead, we rely on text embeddings – low-dimensional word representations in a continuous vector space where similar words are embedded nearby each other. This paper presents ESTEEM,1 a novel tool for visualizing and evaluating spatiotemporal embeddings learned from streaming social media texts. Our tool allows users to monitor and analyze query words and their closest neighbors with an interactive interface. We used stateof-the-art techniques to learn embeddings and developed a visualization to represent dynamically changing relations between words in social media over time and other dimensions. This is the first interactive visualization of streaming text representations learned from social media texts that also allows users to contrast differences across multiple dimensions of the data.


Proceedings of the Human Factors and Ergonomics Society Annual Meeting | 2016

Effects of Gain/Loss Framing in Cyber Defense Decision-Making

Nathan Bos; Celeste Lyn Paul; John Gersh; Ariel Greenberg; Christine D. Piatko; Scott Sperling; Jason Spitaletta; Dustin Arendt; Russ Burtner

Cyber defense requires decision making under uncertainty, yet this critical area has not been a focus of research in judgment and decision-making. Future defense systems, which will rely on software-defined networks and may employ “moving target” defenses, will increasingly automate lower level detection and analysis, but will still require humans in the loop for higher level judgment. We studied the decision making process and outcomes of 17 experienced network defense professionals who worked through a set of realistic network defense scenarios. We manipulated gain versus loss framing in a cyber defense scenario, and found significant effects in one of two focal problems. Defenders that began with a network already in quarantine (gain framing) used a quarantine system more, as measured by cost, than those that did not (loss framing). We also found some difference in perceived workload and efficacy. Alternate explanations of these findings and implications for network defense are discussed.

Collaboration


Dive into the Dustin Arendt's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Leslie M. Blaha

Air Force Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

Celeste Lyn Paul

United States Department of Defense

View shared research outputs
Top Co-Authors

Avatar

Russ Burtner

Pacific Northwest National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Alireza Karduni

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar

Daniel M. Best

Pacific Northwest National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Isaac Cho

University of North Carolina at Charlotte

View shared research outputs
Top Co-Authors

Avatar

John Gersh

Johns Hopkins University Applied Physics Laboratory

View shared research outputs
Top Co-Authors

Avatar

Lyndsey Franklin

Pacific Northwest National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Nathan O. Hodas

Pacific Northwest National Laboratory

View shared research outputs
Researchain Logo
Decentralizing Knowledge