グローバル企業の間では、次世代デジタルトランスフォーメーション(DX)基盤として、アプリケーションコンテナやマイクロサービス、サーバーレスを導入する動きが本格化し、境界防御の枠を超えた「ゼロトラスト」に基づくアーキテクチャ構築や、「Docker」による開発フローの自動化、「Kubernetes」による運用管理の標準化、「FaaS(Function as a Service)」による運用負荷の軽減などが進んでいます。本講演では、海外事例を題材に、エンタープライズユーザーが最新のクラウドネイティブ基盤を利用する場合のリスク/セキュリティ管理について概説します。
グローバル企業の間では、次世代デジタルトランスフォーメーション(DX)基盤として、アプリケーションコンテナやマイクロサービス、サーバーレスを導入する動きが本格化し、境界防御の枠を超えた「ゼロトラスト」に基づくアーキテクチャ構築や、「Docker」による開発フローの自動化、「Kubernetes」による運用管理の標準化、「FaaS(Function as a Service)」による運用負荷の軽減などが進んでいます。本講演では、海外事例を題材に、エンタープライズユーザーが最新のクラウドネイティブ基盤を利用する場合のリスク/セキュリティ管理について概説します。
Students selected topics from the book "What Matters: The World's Preeminent Photojournalists and Thinkers Depict Essential Issues of Our Time" by David Elliot Cohen who maintains that "a single image still has the power to change the world." They reserached their topic, composed an interest statement about whay it mattered to them (and should matter to everyone), compiled images and URLs about the topic to post to a blog and facebook group page.
Panel Moderator: Timothy Reinhold, Ph.D., P.E., IBHS Senior Vice President of Research & Chief Engineer
Panelists: Stephen Quarles, Ph.D., University of California Cooperative Extension and IBHS Wildfire Consultant, and Timothy Smail, Program Lead for Resilient Programs, Savannah River National Laboratory
The Liberal Arts Online: an ACS Blended Learning Webinar
Dr. Rebecca Frost Davis, Program Officer for the Humanities, National Institute for Technology in Liberal Education (NITLE)
Improving technology, changing students, challenging finances, and alternative credentialing sources have all combined to create an online learning boom in higher education. For liberal arts colleges, online learning promises to enhance the curriculum by moving some tasks online to allow for more active learning face-to-face, increasing student time on task, connecting study abroad or internship students back to campus, adding curricular resources, or expanding access to liberal education. Whatever the motivation for considering online learning, liberal arts colleges are forging new ground in bringing the liberal arts educational model--highly interactive, close work between students and faculty--into an online context. This seminar will explore a variety of models for using technology to fulfill the essential learning outcomes of liberal education and suggest ways faculty might enhance their courses with online teaching.
Students selected topics from the book "What Matters: The World's Preeminent Photojournalists and Thinkers Depict Essential Issues of Our Time" by David Elliot Cohen who maintains that "a single image still has the power to change the world." They reserached their topic, composed an interest statement about whay it mattered to them (and should matter to everyone), compiled images and URLs about the topic to post to a blog and facebook group page.
Panel Moderator: Timothy Reinhold, Ph.D., P.E., IBHS Senior Vice President of Research & Chief Engineer
Panelists: Stephen Quarles, Ph.D., University of California Cooperative Extension and IBHS Wildfire Consultant, and Timothy Smail, Program Lead for Resilient Programs, Savannah River National Laboratory
The Liberal Arts Online: an ACS Blended Learning Webinar
Dr. Rebecca Frost Davis, Program Officer for the Humanities, National Institute for Technology in Liberal Education (NITLE)
Improving technology, changing students, challenging finances, and alternative credentialing sources have all combined to create an online learning boom in higher education. For liberal arts colleges, online learning promises to enhance the curriculum by moving some tasks online to allow for more active learning face-to-face, increasing student time on task, connecting study abroad or internship students back to campus, adding curricular resources, or expanding access to liberal education. Whatever the motivation for considering online learning, liberal arts colleges are forging new ground in bringing the liberal arts educational model--highly interactive, close work between students and faculty--into an online context. This seminar will explore a variety of models for using technology to fulfill the essential learning outcomes of liberal education and suggest ways faculty might enhance their courses with online teaching.
人的資本経営[1]を実現するには,生産性とQoW(Quality of Work,働き方の質)を同時に改善し続けていくことが有効である.そのための課題は多岐に渡るため,DX(Digital Transformation)的発想が求められる。一方、情報の約60~80%が位置情報に関連していることが報告されている.本稿では,地理空間情報と他の情報とを連携させて課題解決を支援する地理空間インテリジェンス(GSI)でDXを促進し,製造現場やサービス現場で人的資本経営を支援することに資する筆者らの一連の取り組みについて紹介する.
Our recent activities on cybersecurity researches using AI (Nov. 20, 2020)Takeshi Takahashi
This slide shares our recent R&D activities on cybersecurity using machine learning techniques. Note that this is just a discussion material, thus the details are not described in the slides.
【DLゼミ】XFeat: Accelerated Features for Lightweight Image Matchingharmonylab
公開URL:https://arxiv.org/pdf/2404.19174
出典:Guilherme Potje, Felipe Cadar, Andre Araujo, Renato Martins, Erickson R. ascimento: XFeat: Accelerated Features for Lightweight Image Matching, Proceedings of the 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2023)
概要:リソース効率に優れた特徴点マッチングのための軽量なアーキテクチャ「XFeat(Accelerated Features)」を提案します。手法は、局所的な特徴点の検出、抽出、マッチングのための畳み込みニューラルネットワークの基本的な設計を再検討します。特に、リソースが限られたデバイス向けに迅速かつ堅牢なアルゴリズムが必要とされるため、解像度を可能な限り高く保ちながら、ネットワークのチャネル数を制限します。さらに、スパース下でのマッチングを選択できる設計となっており、ナビゲーションやARなどのアプリケーションに適しています。XFeatは、高速かつ同等以上の精度を実現し、一般的なラップトップのCPU上でリアルタイムで動作します。
セル生産方式におけるロボットの活用には様々な問題があるが,その一つとして 3 体以上の物体の組み立てが挙げられる.一般に,複数物体を同時に組み立てる際は,対象の部品をそれぞれロボットアームまたは治具でそれぞれ独立に保持することで組み立てを遂行すると考えられる.ただし,この方法ではロボットアームや治具を部品数と同じ数だけ必要とし,部品数が多いほどコスト面や設置スペースの関係で無駄が多くなる.この課題に対して音𣷓らは組み立て対象物に働く接触力等の解析により,治具等で固定されていない対象物が組み立て作業中に運動しにくい状態となる条件を求めた.すなわち,環境中の非把持対象物のロバスト性を考慮して,組み立て作業条件を検討している.本研究ではこの方策に基づいて,複数物体の組み立て作業を単腕マニピュレータで実行することを目的とする.このとき,対象物のロバスト性を考慮することで,仮組状態の複数物体を同時に扱う手法を提案する.作業対象としてパイプジョイントの組み立てを挙げ,簡易な道具を用いることで単腕マニピュレータで複数物体を同時に把持できることを示す.さらに,作業成功率の向上のために RGB-D カメラを用いた物体の位置検出に基づくロボット制御及び動作計画を実装する.
This paper discusses assembly operations using a single manipulator and a parallel gripper to simultaneously
grasp multiple objects and hold the group of temporarily assembled objects. Multiple robots and jigs generally operate
assembly tasks by constraining the target objects mechanically or geometrically to prevent them from moving. It is
necessary to analyze the physical interaction between the objects for such constraints to achieve the tasks with a single
gripper. In this paper, we focus on assembling pipe joints as an example and discuss constraining the motion of the
objects. Our demonstration shows that a simple tool can facilitate holding multiple objects with a single gripper.
3. 2
A Survey of Visualization System
for Network Security
H. Shiravi, A. Shiravi, A. A. Ghorbani
IEEE Trans. on Visualization and Computer Graphics
Aug. 2012
5. Challenges in supporting end-user
privacy and security management
with social navigation
Tudumi: Information Visualization System
for Monitoring and Auditing Computer Logs
Closing-the-Loop in Nvisionip: Integrating
Discovery and Search in Security
Visualizations
Visual Correlation of Host Processes and
Network Traffic
Bridging the Host-Network Divide: Survey,
Taxonomy, and Solution
Visualizing Network Data for Intrusion
Detection
xistence Plots: A Low-Resolution Time
eries for Port Behavior Analysis
Re-Inventing Network Security
twork Intrusion Visualization with niva,
Intrusion Detection Visual Analyzer with
ptic Integration
sualizing Cyber Attacks Using ip Matrix
sual Firewall: Real-Time Network Security
onitor
ainstorm: Visualizing ids Alarms
“Visual Correlation for Situational
Awareness
n: A Novel Visual Network-Anomaly
ication Technique
rce Planning, Interactive Monitoring,
terpretation of Security Threats
piralview: Towards Security
olicies Assessment through Visual
Using data type based security alert dialogs
to raise online security awareness
On the challenges in usable security lab studies:
lessons learned from replicating a study on SSL
warnings
Helping Johnny 2.0 to encrypt his
Facebook conversations
ROAuth: recommendation based
open authorization
Visual analysis of code security
多数の論⽂
Intrusion Behavior Detection through Visualization
NVisionIP: Netflow V
State for Security Sit
Visualizing Network Security Events Using
Compound Glyphs from a Service-oriented
Per-spective
Monitoring Network Traffic with Radial
Traffic Analyzer
Visualization of Host Behavior for Network
Security
Home-Centric Visualization of Netw
Traffic for Security Administration
Visflowconnect: Netflow Vis
Link Relationships for Secur
Awareness
Designing Visualization Capabilities
Challenges
Preserving the Big Picture: Visua
Traffic Analysis with tnv
The Spinning Cube of
PortVis: A Tool for Port-Based D
Security Events Netbytes
Visualiza
Behavior
SnortView: Visualization System of Snort
Logs
Idgraphs: Intrusion Detection and Analysis
Using Histographs
A Visualization Paradigm for Ne
Intrusion Detection
Visual Correlation of Network Alerts
Countering Security Information Overload
through Alert and Packet Visualization
Real-Time and Forensic Network Data
Analysis Using Animated and Coordinated
Visualization
Using a Knowledge Represe
Large-Scale Networ
Analysis of Attacks
Visualization of Complex Attacks and
of Attacked Network
Visualizing Graph Dynamics and Similarity
for Enterprise Network Security and
Manage-ment
Ids Alert Visualiza
through Heuristic
Visualizing Interdomain Routing with
BGPlay
Internet
Routing
Anomaly
Detection and
Visualization
Visualizing Internet Routing Changes
Case Study: Interactive Visualization for
Internet Security
Combining Visual and Auto
Mining for Near-Real-Time
Detection and Analysis in
Detecting Flaws and Intruders with Visual
Data Analysis
Bgp Eye: A New Visualization Tool for Real-Time
Detection and Analysis of bgp AnomaliesVisual
analysis of complex firewall configurations
Visual analysis of goal-directed networ
defense decisionsTVi: a visual querying system for network
monitoring and anomaly detection
Monitoring large IP spaces with ClockView
DAEDALUS-VIZ: novel real-time 3D
visualization for darknet monitoring-based
alert system
Nimble cybersecurity incident
management through
visualization and defensible
recommendations
Real-time visualization of network behaviors for
situational awareness
VisTracer: a visual analytics tool to investigate
routing anomalies in traceroutes
Traffic classification using visual motifs: an
empirical evaluation
BURN: baring unknown rogue
Visualization design for immediate
high-level situational assessment
Visual spam
campaigns an
using abstract
representation
Interactive detection of network anomalies via
multiple views
Visualizing attack graphs, reachability,
and trust relationships with
NAVIGATOR
A brick wall, a locked door, and a bandit: a
physical security metaphor for firewall warning
Revealing hidden context: improving mental models of
personal firewall users
Android permissions: user attention,
comprehension, and behavior
Textured agreements: re-envisioning
electronic consent
Demo: Prototype System for Visualizing
Security Risks on Mobile Devices
Visualizing host traffic through graphsAutomated tracing
visualization of soft
security structure a
propertiesMalware images: visualization and
automatic classification&
計72本計72本
8. 7
A brick wall, a locked door, and a bandit: a
physical security metaphor for firewall warnings
Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Clement
Wang, and Konstantin Beznosov
(Univ. of British Columbia, Dalhausie University)
Symposium on Usable Privacy and
Security (SOUPS '11)
July 2011
ユーザ端末に
おける可視化
⾦岡による分類 設
定
http://cups.cs.cmu.edu/soups/2011/proceedings/a1_Raja.pdf
9. 8
Demo: Prototype System for Visualizing Security
Risks on Mobile Devices
Shinʼichiro Matsuo, Akira Kanaoka, Takeshi
Takahashi, Tadashi Minowa
(NICT)
Symposium on Usable Privacy and
Security (SOUPS '12)
July 2012
ユーザ端末に
おける可視化
⾦岡による分類 ネットワーク
http://cups.cs.cmu.edu/soups/2012/demo/demo04.pdf
10. 9
ROAuth: Recommendation Based Open
Authorization
Mohamed Shehab, Said Marouf, and
Christopher Hudel
(Univ. of North Carolina)
Symposium on Usable Privacy and
Security (SOUPS '11)
July 2011
ユーザ端末に
おける可視化
⾦岡による分類 動き
http://cups.cs.cmu.edu/soups/2011/proceedings/a11_Shehab.pdf
11. 10
Tudumi: Information Visualization System for
Monitoring and Auditing Computer Logs
Tetsuji Takada, Hideki Koike
(Univ. of Electro-Communications)
6th International Conference on
Information Visualization (IV'02)
July 2002
⾦岡による分類 ホスト内部
http://www.netaro.info/~zetaka/publications/papers/tudumi-IV2002.pdf
ネットワーク・SP側に
おける可視化
12. 11
Visualizing Network Security Events using Compound
Glyphs from a Service-Oriented Perspective
Jason Pearlman,
Penny Rheingans
(Henggeler Consulting, Univ. of Maryland Baltimore County)
the Workshop on Visualization for
Computer Security (VizSec2007)
2007
⾦岡による分類 ホスト内部
ネットワーク・SP側に
おける可視化
http://link.springer.com/chapter/10.1007%2F978-3-540-78243-8_9
13. 12
Designing Visualization Capabilities for IDS
Challenges
Robert F. Erbacher, Kim Christensen, and
Amanda Sundberg
(Utah State Univ.)
the Workshop on Visualization for
Computer Security (VizSec2005)
2005
⾦岡による分類 ホスト内部
ネットワーク・SP側に
おける可視化
http://digital.cs.usu.edu/~erbacher/publications/SophisticatedAttackArchitecture-1.pdf
14. 13
IDS RainStorm: Visualizing IDS Alarms
Kulsoom Abdullah, Chris Lee, Gregory Conti,
John A. Copeland, John Stasko
(Georgia Tech)
the Workshop on Visualization for
Computer Security (VizSec2005)
2005
⾦岡による分類 攻撃パターン
ネットワーク・SP側に
おける可視化
http://www.cc.gatech.edu/~john.stasko/papers/vizsec05.pdf
15. 14
Visual Correlation of Network Alerts
Stefano Foresti, James Agutter,
Yarden Livnat, Shaun Moon, and Robert Erbacher
(University of Utah, Utah State University)
IEEE Computer Graphics and Applications
2006
⾦岡による分類 攻撃パターン
ネットワーク・SP側に
おける可視化
http://www.researchgate.net/publication/3209355_Visual_corr
elation_of_network_alerts/file/60b7d5154e9538cf47.pdf
16. 15
Visualizing Interdomain Routing with BGPlay
Lorenzo Colitti, Giuseppe Di Battista, Federico
Mariani, Maurizio Patrignani, Maurizio Pizzonia
(Universit`a di Roma Tre)
Journal of Graph Algorithms and
Applications
2005
⾦岡による分類 通信
ネットワーク・SP側に
おける可視化
http://jgaa.info/accepted/2005/Colitti+2005.9.1.pdf
17. 16
TVi: A Visual Querying System for Network
Monitoring and Anomaly Detection
Alberto Boschetti, Chris Muelder, Luca Salgarelli,
Kwan-Liu Ma (Univ. of Brescia, UC Davis)
the Workshop on Visualization for
Computer Security (VizSec2011)
2011
⾦岡による分類 通信
ネットワーク・SP側に
おける可視化
http://www.vizsec2011.org/program/1-Boschetti.pdf
18. 17
BURN: Baring Unknown Rogue Networks
Francesco Roveta, Luca Di Mario, Federico
Maggi, Giorgio Caviglia, Stefano Zanero, Paolo
Ciuccarelli (Politecnico di Milano)
the Workshop on Visualization for
Computer Security (VizSec2011)
2011
⾦岡による分類 攻撃パターン
ネットワーク・SP側に
おける可視化
http://www.vizsec2011.org/program/6-Roveta.pdf
19. 18
Automated Tracing and Visualization of Software
Security Structure and Properties
Wenbin Fang, Barton P. Miller, James A. Kupsch
(Univ. of Wisconsin Madison)
the Workshop on Visualization for
Computer Security (VizSec2011)
2011
⾦岡による分類 アプリソフトウェアの可視化
http://research.cs.wisc.edu/mist/papers/Wenbin12SecSTAR.pdf
20. 19
Malware Images: Visualization and Automatic
Classification
L. Nataraj S. Karthikeyan, G. Jacob, B. S.
Manjunath (UC Santa Barbara)
the Workshop on Visualization for
Computer Security (VizSec2011)
2011
⾦岡による分類 マルウェアソフトウェアの可視化
http://www.vizsec2011.org/program/4-Nataraj.pdf