Figure 2From: Fluency of visualizations: linking spatiotemporal visualizations to improve cybersecurity visual analyticsInvestigate the number of workstations that violate policy 5. Top: We want to check out which workstations are new to violation of policy 5 at 2012-02002 4:45 p.m. by clicking on the segment in the curve. Middle: The map marks by red squares the two new offices with policy 5 violations. Bottom: Clicking on the top marked square to see the details.Back to article page