Call for Submission: Insight2016

Call for Submission

Insight2016

scientific data as viewed from an aesthetic perspective

http://www.insight2016.at

Graphical visualization is an efficient way to present specific information about a large amount of data. Sometimes the act of expanding the view of underlying or superordinate information creates images which can be strikingly beautiful. If you have produced such an image recently during your research you are welcome to participate at INSIGHT2016!

What?

  • scientific data visualization (no photographic images)
  • the data will be presented in an exhibition

How?

  • mail your work and the related information to: submission@insight2016.at
  • deadline: January 15, 2016

Why?

  • show how interesting your work can be
  • support a charity
  • win an award

Who can submit?

  • everyone that gains information from data visualization

When and Where?

  • exhibition period: April 2016
  • Lakeside Science & Technology Park, Lakeside B11, 9020 Klagenfurt am Wörthersee, Österreich

Detailed Informationhttp://www.insight2016.at

Contact: Theresa Rienmüller, Mathias Brandstötter, team@insight2016.at

Posted in Veranstaltungen | Kommentare deaktiviert für Call for Submission: Insight2016

Aggregation von Schwachstellen auf Basis von CVSS

Alexander Beck | 10.12.2015 | 15:00 Uhr | HS 4

Kurzfassung

IT-Systeme sind stark zusammenhängende komplexe Strukturen, so dass eine Fokussierung auf das IT-System im Ganzen nur eine bedingt effiziente Sicherheitsbewertung gewährleistet. Die Sicherheit dieser komplexen Systemlandschaften stets aktualisiert unter Berücksichtigung aller Wechselbeziehungen zwischen Komponenten dieser Systemlandschaften darzustellen, gestaltet sich mangels geeigneter Modelle schwierig. Neben diesen Modellen bilden Schwachstellenbewertungen die Grundlage für die Bewertung der Sicherheit und werden durch aufwändige Betrachtungen interpretiert, um eine Gesamtbewertung zu ermitteln. Will man dieses Vorgehen automatisieren, muss zunächst eine gemeinsame Repräsentation von Schwachstellenbewertungen vereinbart werden. Das dazu geeignete Common Vulnerability Scoring System (CVSS) ermöglicht die Bewertung einzelner Schwachstellen hinsichtlich verschiedenster Fragestellungen. Um eine Darstellung der Gesamtsicherheit zu erreichen, müssen diese Schwachstellen aggregiert werden. Unter einer Aggregation ist dabei die gemeinsame Interpretation aller im Fokus stehenden Schwachstellen zur Erreichung einer Gesamtbewertung zu verstehen, welche auf Basis eines neuronalen Netzwerkes erfolgt. Das neuronale Netz ist ein lernfähiges Konzept der Informatik, mit dem es möglich ist auf Basis definierter Eingabeparameter ein definiertes Ergebnis zu modellieren. Dabei wird das Netz trainiert und die Ergebnisse mit Ergebnissen der bisherigen manuellen Bewertungsverfahren verglichen, bis eine entsprechende Qualität der automatisch ermittelten Ergebnisse gesichert ist.

Alexander Beck ist seit 2011 bei der Volkswagen AG tätig. Zuvor studierte er Informatik an Hochschule Harz und Otto-von-Guericke-Universität Magdeburg unter anderem mit den Schwerpunkten Datenintensive Systeme und Sicherheit. Im Rahmen seiner Dissertation erforscht er Verfahren zur automatisierten Sicherheitsbewertung von komplexen heterogenen IT-Infrastrukturen auf Basis neuronaler Netze.
Beruflich war er mehrere Jahre in der Informationssicherheit im Volkswagen Konzern tätig und beschäftigte sich mit den Themen Authentifizierung und Verschlüsselung. Aktuell arbeitet er im Bereich IT Projekt- und Programmmanagement der Volkwagen Financial Services AG und verantwortet IT Projekte im In- und Ausland.

Posted in TEWI-Kolloquium | Kommentare deaktiviert für Aggregation von Schwachstellen auf Basis von CVSS

Einladung zur Generalversammlung 2015

Der Förderverein Technische Fakultät an der Universität Klagenfurt lädt Sie hiermit herzlich zur Generalversammlung ein.

Wann: Freitag, 27. November 2015, 16:00 Uhr

Wo: Alpen-Adria Universität Klagenfurt, Raum E.2.69, Universitätsstrasse 65-67, 9020 Klagenfurt

Tagesordnung:

  1. Begrüßung
  2. Genehmigung der Tagesordnung
  3. Genehmigung des Protokolls der letzten Generalversammlung
  4. Bericht des Obmanns
  5. Bericht des Geschäftsführers
  6. Bericht der Rechnungsprüfer
  7. Wahl der Rechnungsprüfer
  8. Entlastung des Vorstands
  9. Budget 2016
  10. Allfälliges

Mit freundlichen Grüßen

Christian Inzko (Obmann)
Christian Timmerer (Geschäftsführer)

P.S.: Das Protokoll der vorjährigen Generalversammlung finden Sie hier.

Posted in Veranstaltungen | Kommentare deaktiviert für Einladung zur Generalversammlung 2015

Multimedia Data Analysis with Gradient-based Signatures

Dr. Christian Beecks | 24.11.2015 | 16:00 Uhr | E.2.42

Abstract

With the advent of social networks and the advancement of powerful internet-enabled mobile devices, millions of users are able to easily generate, process, and share multimedia data at billion-scale every single day. The resulting multitude and versatility of multimedia data made available in the Internet challenge todays’ data management and analysis algorithms. In many research and application areas including information retrieval, data mining, and computer vision, users are no longer satisfied with keyword-based access but want to search, browse, explore, and analyze multimedia data according to content-based characteristics. One fundamental operation underlying many data analysis algorithms is similarity search which aims at retrieving the most similar multimedia objects with respect to a query. In order to carry out similarity search for query-like multimedia objects, the way of modeling similarity is of major significance due to its impact on efficiency and effectiveness.

In this talk, I will present my ongoing research in this fascinating field and highlight future research directions. More specifically, I will show how to approach similarity between multimedia data objects by means of gradient-based signatures in order to facilitate data analysis with high efficiency and efficacy.

Beecks

 

Christian Beecks is a postdoctoral researcher in the data management and data exploration group at RWTH Aachen University, Germany. His research interests include efficient and adaptive multimedia data analysis, distance-based multimedia indexing and query processing, and real-time data management.

 

Posted in TEWI-Kolloquium | Kommentare deaktiviert für Multimedia Data Analysis with Gradient-based Signatures

Non stationary Continuous Time Bayesian Networks

Prof. Fabio Stella | 11.11.2015 | 10:00 Uhr | E.1.42

Abstract

Non stationary continuous time Bayesian networks are presented and described. They allow to model systems where conditional independence relationships are allowed to change over time at discrete points in time. They build on the main blocks of continuous time Bayesian networks and non stationary dynamic Bayesian networks. The seminar presents the problem of non-stationary structural learning for such probabilistic graphical models and describes solution algorithms for three different settings. Furthermore, we present preliminary results of non stationary structural learning of Continuous Time Bayesian Networks on the following biological datasets; drosophila saccharomyces cerevisiae and songbird.

StellaFabio Stella is an associate professor at the Dipartimento di Informatica, Sistemistica e Comunicazione of the Università degli Studi di Milano-Bicocca. His research focuses on models and algorithms for data analysis and decision making under uncertainty in the areas of Business Intelligence, Data and Text Mining and Computational Finance. In the winter term 2015/16 he is giving the course 625.605 – Business Intelligence in Klagenfurt for the second time.

Posted in TEWI-Kolloquium | Kommentare deaktiviert für Non stationary Continuous Time Bayesian Networks

Jobs at JOANNEUM RESEARCH in Klagenfurt

JOANNEUM RESEARCH Forschungsgesellschaft mbH (JOANNEUM RESEARCH) is a business oriented leader of innovation and a technology provider. It is linked to a worldwide network and has provided cutting-edge re-search according to the highest international standard for over thirty years. With a focus on applied research and technology development, JOANNEUM RESEARCH plays a key role in transfer of technology and know-how. Our newly established ROBOTICS institute focuses primarily on human-robot collaboration for innovative production processes, as well as on robot safety.

For our new location at the Lakeside Science & Technology Park in Klagenfurt, Austria, we are seeking highly motivated

Posted in Stellenausschreibungen | Kommentare deaktiviert für Jobs at JOANNEUM RESEARCH in Klagenfurt

15th Central European Conference on Cryptology (CECC) successfully hosted at Alpen-Adria-Universität Klagenfurt

The Department of Mathematics and the System Security Research group jointly organized the 15th Central European Conference on Cryptology (CECC) from 8th until 10th of July 2015. The conference featured invited lectures by Andrey Bogdanov (from Technical University of Denmark) on Symmetric-Key Cryptography in Untrusted Environments, Keith Martin (from Royal Holloway, University of London), giving an exciting lecture on bridging the gap between (cryptographic) theory and practice, Vincent Rijmen (from Katholieke Universiteit Leuven, Belgium), talking about the currently hot topic of threshold implementations against side-channel information leakage, and Daniel Genkin (from Tel Aviv University, Israel), impressing people with a live demonstration on how easy it is to drain information from a seemingly secure computer.

The conference brought together researchers of various subfields of security, engaging themselves in interesting and fruitful discussions on recent advances in many aspects of cryptology, such as cryptanalysis, cryptographic applications in information security, design of cryptographic systems and many more.

cecc2015-group

Stay tuned for the upcoming instance of the Central European Conference on Cryptology, to be held in Hotel Magnolia, Piestany, Slovakia, June 22 – 24, 2016, where new results from this year’s newly created joint research alliances will be presented.

The CECC15 book of abstracts is available.

Posted in Veranstaltungen | Kommentare deaktiviert für 15th Central European Conference on Cryptology (CECC) successfully hosted at Alpen-Adria-Universität Klagenfurt

The new index structure for sequential pattern-based aggregate queries

Prof. Tadeusz Morzy | 23.10.2015 | 14:00 Uhr | E.2.69

Abstract

Many applications require processing and analyzing sequential data. Examples include the analysis of passenger traveling histories, stock market prices, purchases of customers over time, meteorological events, workflow and RFID logs, etc. Recently, issues related to warehousing and analytical processing (OLAP) of sequential data have received growing attention. Particularly, the concept of Sequence OLAP (SOLAP) has been proposed that support OLAP processing of different kinds of aggregate queries on sequential data. The main feature distinguishing SOLAP from traditional OLAP is that data sequences managed by an SOLAP system are characterized by subsequence patterns they possess. The SOLAP systems allow to group data sequences based on patterns they possess and apply aggregate functions to each group. This kind of SOLAP queries are called a sequential pattern-based aggregate (PBA) queries. The processing of PBA queries is expensive due to the fact that they require full scan of all stored sequences. The natural question is how to efficiently evaluate this kind of queries?

The talk focuses on the new index structure supporting processing of sequential pattern-based aggregate queries. The structure of the index will be presented as well as classes of pattern-based aggregate queries supported by the index will be discussed. Finally, the performance of PBA queries using the proposed index will be presented.

morzyTadeusz Morzy is a professor in the Computing Science Department of Poznan University of Technology. He received his M. Sc., Ph. D. and Polish Habilitation from the Technical University of Poznań, Poland. He has held visiting positions at the Loyola University, New Orleans, Klagenfurt University Austria, University La Sapienza Italy, and Free University Amsterdam. He has authored and coauthored over 100 papers on databases, data mining, and data warehousing. He is co-author of a book on „Concurrency Control in Distributed Database Systems“ by North-Holland, editor and coauthor of “Handbook on Data Management” by Springer, and author of “Data Mining: Methods and Algorithms” (in Polish). He served as General Chair of the 2nd and 16th ADBIS Conferences (1998, 2012), and has served/serves on numerous program committees of international conferences and workshops. His research interests include data mining, data warehousing, transaction processing in database and data warehouse systems, access methods and query processing for databases, database optimization and performance evaluation.

Posted in TEWI-Kolloquium | Kommentare deaktiviert für The new index structure for sequential pattern-based aggregate queries

Rückblick: Current Directions in Behavioral Energy Economics [Slides]

Der Rückblick zum TEWI-Kolloquium von Laurens Rook am 17.7.2015 beinhaltet die Folien:

Abstract:

In recent years many times sustainability and renewable energy consumption have been set on the agenda. However, the pressing issue how to make people reduce their amount of energy consumed – or their switching  towards green alternatives – has received far less research attention. The academic discipline of behavioral economics has much to offer to this debate. In the presentation we will summarize prior research on the role of individual differences and various pricing and framing techniques that have proven to be helpful in making people switch to green energy. We will also address challenges and future directions in behavioral energy economics.

Bio:image001

Laurens Rook is Assistant Professor at Delft University of Technology, the Netherlands. He received his Ph.D. from the Erasmus University Rotterdam (in 2008), and his bachelor and master’s degrees from the  University of Amsterdam, the Netherlands (in 2001; MA Thesis on Mass Psychology in Fine Art and Advertising).  His research focuses on herd and imitative behavior in creative context, and is published in the Creativity Research Journal.  His second focus is on behavioral informatics. Laurens collaborates with the Learning Agents Research Group at Erasmus (LARGE). A recent paper on using social media apps to make people consume green energy  (together with University of Connecticut, USA) was awarded best poster  award (2nd prize, the 2014 Conference on Information Systems and Technology).  He lectures on Research Methodology,   Statistics, and Group Dynamics, but also is a graduated professional artist (Academy of Arts Rotterdam, 1997) with collected work in the Municipal Archives of Rotterdam, the Netherlands, and the National Art Collection of Ireland.

Posted in TEWI-Kolloquium | Kommentare deaktiviert für Rückblick: Current Directions in Behavioral Energy Economics [Slides]

12. Österreichischer IT-Sicherheitstag

SITAG15. Oktober 2015 | Messegelände Klagenfurt

  • Security-Awareness – The Human Firewall
  • Bezahlen im Webshop – Neue Möglichkeiten und neue Fragen
  • Aktuelle Sicherheitsbedrohungen

Drei exemplarische Vortragstitel aus dem diesjährigen Programm des Sicherheitstages.

Die Schwerpunkte der heurigen Tagung werden in den Sessions

  • Awareness & Zertifizierung
  • Live Hacking & Demos
  • Rechtliche Aspekte
  • Technisches

zusammengefasst.

Das vollständige Programm des 12. Österreichischen IT-Sicherheitstages finden Sie hier:

http://www.syssec.at/sitag2015prog

Der heurige Standort der Veranstaltung im Rahmen des IKT Kongresses IT-Carinthia spricht eine interessante Zielgruppe in Südösterreich und im Alpen-Adria-Raum an und bietet eine ideale Gelegenheit, um neue Kontakte zu knüpfen.

Die Anmeldung erfolgt über: http://www.syssec.at/sitag2015anmeldung

Die Teilnahmegebühr für diese Veranstaltung beträgt € 79,00, für Frühbucher bis zum 19.09.2015 € 63,00.

Dr. Peter Schartner
Veranstalter

Die Österreichischen IT-Sicherheitstage werden veranstaltet von der Universität Klagenfurt | Institute für Informatik – Forschungsgruppe Systemsicherheit (syssec). Der 12. Österreichische IT-Sicherheitstag findet begleitend zur IT Carinthia, der IKT-Kongress-Messe für Südösterreich und den Alpen-Adria Raum, statt.

Posted in Veranstaltungen | Kommentare deaktiviert für 12. Österreichischer IT-Sicherheitstag
RSS
EMAIL