• Title/Summary/Keyword: 행위 가시화

Search Result 15, Processing Time 0.026 seconds

A Coordinate System of Classification for Effective Visualizations of Story Properties (스토리 창작 특성의 효과적 가시화를 위한 분류 좌표계 연구)

  • Kim, Myoung-Jun
    • Journal of Digital Contents Society
    • /
    • v.18 no.6
    • /
    • pp.1119-1125
    • /
    • 2017
  • Genres and actions of stories can be used to classify stories, and used effectively as well for visualizing story properties. This paper proposes a Genre-Action coordinate system for visualizing story property data in 2-dimension that has similarities between the genre and action items along the axes, i.e. a property of spatial continuum. With the proposed Genre-Action coordinate system we found that the genre and action items in the axes are arranged according to their similarities and we were able to achieve a spatially meaningful visualization of story properties where the related data form clusters.

Graph-based Fraud Detection System: Design and Issue Review (그래프 기반의 이상 행위 탐지 시스템: 설계 및 이슈)

  • Lee, Jeong-Hoon;Kim, Dongwon;Chae, Songyi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.820-821
    • /
    • 2017
  • 최근 전자상거래의 활성화로 인해 전자금융거래에서 불법/이상 행위로 인한 피해규모가 증가하고 그 수법이 다양해지고 있다. 본 논문에서는 동적 그래프 처리 기술인 스트리밍 그래프 데이터에 대한 서브그래프 매칭 기술과 그래프 가시화 기술을 활용하여 불법/이상 행위를 탐지하는 클라이언트-서버 아키텍처 기반의 프레임워크를 설계한다. 그리고 불법/이상 행위를 탐지하는데 활용될 수 있는 기반 기술인 동적 그래프 매칭 기술과 그래프 가시화 기술의 최신 동향을 리뷰하고 최신 기술이 가진 한계 및 이슈를 제시한다.

Development of a Graph-based Visualization Tool for Fraud Detection (불법/이상 행위 탐지를 위한 그래프 기반 가시화 툴 개발)

  • Moon, Seunghyun;Jeon, Hyo-Rim;Seo, In;Han, Wook-Shin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.781-784
    • /
    • 2017
  • 본 논문에서는 최근 금융, 보험 등에서 빈번하게 발생하는 불법/이상 행위를 탐지하기 위해 데이터 그래프에서 사용자가 찾고자 하는 이상 패턴을 찾아 결과를 보여주는 그래프 가시화 툴을 제안한다. 개발한 툴은 정점과 간선 추가 및 삭제 등의 유용한 기능을 제공하기 때문에, 동적 그래프에 대한 불법/이상 행위 탐지를 위한 응용 프로그램에서도 널리 사용될 수 있을 것이다.

Next Generation Convergence Security Framework for Advanced Persistent Threat (지능형 지속 위협에 대한 차세대 융합 보안 프레임워크)

  • Lee, Moongoo;Bae, Chunsock
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.92-99
    • /
    • 2013
  • As a recent cyber attack has a characteristic that is intellectual, advanced, and complicated attack against precise purpose and specified object, it becomes extremely hard to recognize or respond when accidents happen. Since a scale of damage is very large, a corresponding system about this situation is urgent in national aspect. Existing data center or integration security framework of computer lab is evaluated to be a behind system when it corresponds to cyber attack. Therefore, this study suggests a better sophisticated next generation convergence security framework in order to prevent from attacks based on advanced persistent threat. Suggested next generation convergence security framework is designed to have preemptive responses possibly against APT attack consisting of five hierarchical steps in domain security layer, domain connection layer, action visibility layer, action control layer and convergence correspondence layer. In domain connection layer suggests security instruction and direction in domain of administration, physical and technical security. Domain security layer have consistency of status information among security domain. A visibility layer of Intellectual attack action consists of data gathering, comparison, decision, lifespan cycle. Action visibility layer is a layer to control visibility action. Lastly, convergence correspond layer suggests a corresponding system of before and after APT attack. An introduction of suggested next generation convergence security framework will execute a better improved security control about continuous, intellectual security threat.

Clustering Character Tendencies found in the User Log of a Story Database Service and Analysis of Character Types (스토리 검색 서비스의 사용자 기록에 나타난 인물 성향 군집화 및 유형 분석)

  • Kim, Myoung-Jun
    • Journal of Digital Contents Society
    • /
    • v.17 no.5
    • /
    • pp.383-390
    • /
    • 2016
  • is a service providing story synopses that match user's query. This paper presents a classification of character types by clustering of character tendencies found in the user log of . We also present a visualization method of showing genre-action relationships to each character type, and investigate the genre-action relationships of the major character types. We found that a small number of character types can represent more than half of the character tendencies and the character types tend to have a relationship to particular genres and actions. According to this properties, it would be desirable to provide supports for creative writing classified by character types.

A Real-Time and Statistical Visualization Methodology of Cyber Threats Based on IP Addresses (IP 주소 기반 사이버공격 실시간 및 통계적 가시화 방법)

  • Moon, Hyeongwoo;Kwon, Taewoong;Lee, Jun;Ryou, Jaecheol;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.465-479
    • /
    • 2020
  • Regardless of the domestic and foreign governments/companies, SOC (Security Operation Center) has operated 24 hours a day for the entire year to ensure the security for their IT infrastructures. However, almost all SOCs have a critical limitation by nature, caused from heavily depending on the manual analysis of human agents with the text-based monitoring architecture. Even though, in order to overcome the drawback, technologies for a comprehensive visualization against complex cyber threats have been studying, most of them are inappropriate for the security monitoring in large-scale networks. In this paper, to solve the problem, we propose a novel visual approach for intuitive threats monitoring b detecting suspicious IP address, which is an ultimate challenge in cyber security monitoring. The approach particularly makes it possible to detect, trace and analysis of suspicious IPs statistically in real-time manner. As a result, the system implemented by the proposed method is suitably applied and utilized to the real-would environment. Moreover, the usability of the approach is verified by successful detecting and analyzing various attack IPs.

The Future and Prospects of NFT Art : On the basis of Actor-Network Theory (NFT 아트의 미래와 전망 : 행위자네트워크 이론을 중심으로)

  • Cheon, Mi Lim;Kim, Hong Kyu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.397-405
    • /
    • 2022
  • NFT art is a new art formed based on NFT technology. This is attracting great attention in the existing art world and art market. Therefore, it is required to analyze whether NFT art can establish itself as a new area of art. Therefore, the formation and development process of NFT art is analyzed from the perspective of Actor-Network Theory of Science and Technology and Studies, and the case of NFT artist 'beeple' is a representative example. It also discusses the artistic value of NFT art and its relationship with traditional art networks based on the aesthetics of science and technology researcher Graham Harman. In particular, it analyzes the future and genre sustainability of NFT art through the case of NFT project "Cryptopunks" and "PUNKISM" advocating a new art genre. By analyzing NFT art with ANT, I would like to raise a technical, aesthetic, and philosophical questions and propose a positive prospect as a new art genre.

Development of a Design Ontology and Design Process Visualization Environment for the Analysis and Leaning of Conceptual Design (개념 설계과정의 설계정보가시화를 위한 온톨로지 개발과 환경구현)

  • Kim, Sung-Ah
    • Korean Institute of Interior Design Journal
    • /
    • v.16 no.4
    • /
    • pp.119-126
    • /
    • 2007
  • A prototype design process visualization and guidance system, is being developed. Its purpose is to visualize the design process in more intuitive manner so that one can get an insight to the complicated aspects of the design process. By providing a tangible utility to the design process performed by the expert designers or guided by the system, novice designers will be greatly helped to learn how to approach a certain class of design. Not only as an analysis tool to represent the characteristics of the design process, the system will be useful also for learning design process. A design ontology is being developed to provide the system with a knowledge-base, representing designer's activities associated with various design information during the conceptual design process, and then to be utilized for a computer environment for design analysis and guidance. To develop the design ontology, a conceptual framework of design activity model is proposed, and then the model has been tested and elaborated through investigating the nature of the early conceptual design. A design process representation model is conceptualized based on the ontology, and reflected into the development of the system. This paper presents the development process of the visualization system, modeling of design process ontology, and how the system could be utilized for the analysis and learning of conceptual design methods using computer mediated design support environment.

Designing of The Enterprise Insider-Threats Management System Based on Tasks and Activity Patterns (사용자 직무와 활동패턴 기반의 내부자위협통합관리체계 설계)

  • Hong, Byoung Jin;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.3-10
    • /
    • 2015
  • Recent massive data breaches or major security incidents show that threats posed by insiders have greatly increased over time. Especially, authorized insiders can cause more serious problems than external hackers can. Therefore there is a growing need to introduce a system that can monitor the insider threats in real time and prevent data breaches or security incidents in early-stage. In this paper, we propose a EITMS(Enterprise Insider-Threats Management System). EITMS detects the abnormal behaviors of authorized insiders based on the normal patterns made from their roles, duties and private activities. And, in order to prevent breaches and incidents in early-stage, a scoring system that can visualize the insider threats is also included.

Validity of the Korean Interpersonal Caring Behavior Scale (ICBS) for Clinical Nurse (임상간호사를 위한 한국형 대인돌봄행위 측정도구의 타당성)

  • Lee, Sook;Choi, Ae-Sook;Yim, So-Youn;Chun, Yeol-Eo
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.89-101
    • /
    • 2022
  • This study attempted to develop a scale that Interpersonal Caring Behavior Measurement Tool, based on Kim's Interpersonal caring theory, and confirmed its reliability and validity. The items were used as 50 items of 10 concepts based on the Su-ji Kim's interpersonal care theory in Korea developed by Seon-hee Yun. Subjects were nurses working at a general hospital or higher, who agreed to participate in this study. As a result of the study, 50 questions in 10 concepts of the first were derived from active listening, accepting, complimenting, noticing, and companioning through exploratory and confirmatory factor analysis, and criterion validity and reliability were verified. This tool is meaningful in that it can measure Caring Behavior from the perspective of the subject and family, and can be used as an index to visualize the quality improvement of nursing care by quantifying it.