• Title/Summary/Keyword: 모델리스트

Search Result 182, Processing Time 0.033 seconds

A Design of Technology Element-based Evaluation Model and its Application on Checklist for the IoT Device Security Evaluation (사물인터넷 기기 보안평가를 위한 기술요소 기반의 모델 설계 및 체크리스트 적용)

  • Han, Seul Ki;Kim, Myuhng Joo
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • As the demand for Internet of Things(IoT) increases, the need for the security of IoT devices is increasing steadily. It is difficult to apply the conventional security theory to IoT devices because IoT devices are subject to be constrained by some factors such as hardware, processor, and energy. Nowadays we have several security guidelines and related documents on IoT device. Most of them, however, do not consider the characteristics of specific IoT devices. Since they describes the security issues comprehensively, it is not easy to explain the specific security level reflecting each characteristics of IoT devices. In addition, most existing guidelines and related documents are described in view of developers and service proposers, and thus ordinary users are not able to assess whether a specific IoT device can protect their information securely or not. We propose an security evaluation model, based on the existing guidelines and related documents, for more specific IoT devices and prove that this approach is more convenient to ordinary users by creating checklists for the smart watch.

  • PDF

An approach to analyze commonality and variability of feature based on Ontology in Software Product line Engineering (Software 제품계열공학에서 온톨로지에 기반한 feature의 공통성 및 가변성 분석모델)

  • Kim Jin-Woo;Lee Soon-Bok;Lee Tae-Woong;Baik Doo-Kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.139-141
    • /
    • 2006
  • 제품계열공학에서 feature diagram(FD)은 개발자의 직관이나 도메인 전문가의 경험에 근거하여 작성되어, feature간의 공통성 및 가변성분석 기준이 불명확하며 비정형적인 feature의 공통성 및 가변성 분석으로 인한 stakeholder의 공통된 이해가 부족한 문제점을 내포하고 있다. 따라서, 본 논문에서는 이를 해결하기 위하여 공통된 feature의 이해를 위해 feature 속성리스트에 기반한 메타 feature모델과 feature간의 의미유사성관계를 이용한 온톨로지를 적용한 공통성 및 가변성 분석모델을 제안한다.

  • PDF

Visual Commonsense Reasoning with Knowledge Graph (지식 그래프를 이용한 영상 기반 상식 추론)

  • Lee, Jae-Yun;Kim, In-Cheol
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.994-997
    • /
    • 2019
  • 영상 기반 상식 추론(VCR) 문제는 기존의 영상 기반 질문-응답(VQA) 문제들과는 달리, 영상에 포함된 사물들 간의 관계 파악과 답변 근거 제시 등 별도의 상식 추론이 요구되는 새로운 지능 문제이다. 본 논문에서는 입력 데이터(영상, 자연어 질문, 응답 리스트)에서 사물들 간의 관계와 맥락 정보를 추출해내는 모듈들 외에, 별도로 ConceptNet과 같은 외부 지식 베이스로부터 관련 상식들을 직접 가져다 GCN 기반의 지식 그래프 임베딩 과정을 거쳐 추가적으로 활용할 수 있는 모듈들을 포함한 새로운 심층 신경망 모델인 KG_VCR을 제안한다. 제안 모델인 KG_VCR의 세부 설계사항들을 소개하고, VCR 벤치마크 데이터 집합을 이용한 다양한 실험들을 통해 제안 모델의 성능을 입증한다.

A Study on Checklist for Test Process Maturity Improvement on Test Maturity Model(TMM) (TMM 향상을 위한 테스트 프로세스 성숙도 체크리스트 연구)

  • 김기두;류동국;김영철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10b
    • /
    • pp.487-489
    • /
    • 2004
  • 소프트웨어 테스트는 소프트웨어 개발 과정에 매우 중요한 요소이다. 현재 많은 조직들이 테스트 성숙도를 높이기 위한 노력을 진행하고 있다. 그 중에서 일리노이공대의 TMM(Test Maturity Model)이 대표적이라고 볼 수 있다. 하지만 TMM은 바로 테스트 성숙수준을 측정하는데 문제가 있다. 그래서 TMM과 테스트 프로세스를 향상시킬 수 있는 TPI(Test Process Improvement) 모델을 통해, 우리는 Enhanced-TMM에 테스트 속성과 성숙도 상호관련 매트릭스를 사용한 테스트 성숙수준 측정 방법을 구체적으로 제안하고자 한다.

  • PDF

A Resource-Aware Mapping Algorithm for Coarse-Grained Reconfigurable Architecture Using List Scheduling (리스트 스케줄링을 통한 Coarse-Grained 재구성 구조의 맵핑 알고리즘 개발)

  • Kim, Hyun-Jin;Hong, Hye-Jeong;Kim, Hong-Sik;Kang, Sung-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.6
    • /
    • pp.58-64
    • /
    • 2009
  • For the success of the reconfigurable computing, the algorithm for mapping operations onto coarse-grained reconfigurable architecture is very important. This paper proposes a resource-aware mapping system for the coarse-grained reconfigurable architecture and its own underlying heuristic algorithm. The operation assignment and the routing path allocation are simultaneously performed with a cycle-accurate time-exclusive resource model. The proposed algorithm minimizes the communication resource usage and the global memory access with the list scheduling heuristic. The operation to be mapped are prioritized with general properties of data flow. The evaluations of the proposed algorithm show that the performance is significantly enhanced in several benchmark applications.

Detecting Malicious Scripts in Web Contents through Remote Code Verification (원격코드검증을 통한 웹컨텐츠의 악성스크립트 탐지)

  • Choi, Jae-Yeong;Kim, Sung-Ki;Lee, Hyuk-Jun;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.47-54
    • /
    • 2012
  • Sharing cross-site resources has been adopted by many recent websites in the forms of service-mashup and social network services. In this change, exploitation of the new vulnerabilities increases, which includes inserting malicious codes into the interaction points between clients and services instead of attacking the websites directly. In this paper, we present a system model to identify malicious script codes in the web contents by means of a remote verification while the web contents downloaded from multiple trusted origins are executed in a client's browser space. Our system classifies verification items according to the origin of request based on the information on the service code implementation and stores the verification results into three databases composed of white, gray, and black lists. Through the experimental evaluations, we have confirmed that our system provides clients with increased security by effectively detecting malicious scripts in the mashup web environment.

Three Apologies: A Study of the Evolution of Crisis Communication Strategies by the Arts Council Korea (ARKO) in Response to the Blacklist Case (세 번의 사과 - 한국문화예술위원회 블랙리스트 사건의 위기 커뮤니케이션 사례 -)

  • Jung, Yong Sung;Hyun, Eun Jung
    • Korean Association of Arts Management
    • /
    • no.60
    • /
    • pp.93-119
    • /
    • 2021
  • How an organization communicates to relevant stake-holders in a crisis is critical to gain continued social acceptance and legitimacy. In this paper, we examine the evolution of crisis communication strategies by the Arts Council Korea(ARKO) in response to the Blacklist case that unfolded from 2017 through 2019. In doing so, we focused on the 'Pop-up Theater case', where ARKO officials had exercised their discretion to have the play produced by theater artists be discontinued because they had viewed that the play was engendering the imagery of the Sewol-Ho tragedy. Using a case study methodology, we follow a series of events that occurred during this crisis management process, analyzing three apologies issued by the ARKO. In doing so, we draw on Hearit (2006)'s crisis management theory to evaluate how ARKO's crisis communication was managed. Overall, our study highlights that without incorporating truthfulness and sincerity congruent with stakeholder expectations, an organization's crisis communication is likely to be less successful.

A Model for Evaluating Confidence and Satisfaction of Health Information Web-Sites (건강정보 웹사이트의 신뢰성과 만족도 평가 모델)

  • Woo Young-Woon;Cho Kyoung-Won
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.9
    • /
    • pp.42-49
    • /
    • 2006
  • In this paper, we proposed a model to evaluate confidence and satisfaction of health information web-sites visited by general health consumers. In order to propose the evaluation model, lots of foreign and domestic researches are investigated and analyzed. Based on these analyses, confidence and satisfaction standards for the model are proposed. A process for evaluation and a method for calculation of evaluation value by the standards are proposed, too. The proposed model can be utilized as a tool for analyzing conventional health information web-sites and can be utilized as check lists for developments in case of health information web-sites under construction.

  • PDF

Browser fuzzing and analysis using known vulnerability (파이썬 모듈과 정규표현식을 활용한 웹 취약점 탐색 자동화 봇)

  • Kim, Nam-gue;Kim, Ki Hwan;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.749-751
    • /
    • 2016
  • Internet technology is universal, news from the Web browser, shopping, search, etc., various activities have been carried out. Its size becomes large, increasing the scale of information security incidents, as damage to this increases the safety for the use of the Internet is emphasized. IE browser is ASLR, such as Isolated Heap, but has been continually patch a number of vulnerabilities, such as various protection measures, this vulnerability, have come up constantly. And, therefore, in order to prevent security incidents, it is necessary to be removed to find before that is used to exploit this vulnerability. Therefore, in this paper, we introduce the purge is a technique that is used in the discovery of the vulnerability, we describe the automation technology related thereto. And utilizing the known vulnerabilities, and try to show any of the typical procedures for the analysis of the vulnerability.

  • PDF

Candidate Word List and Probability Score Guided for Korean Scene Text Recognition (후보 단어 리스트와 확률 점수에 기반한 한국어 문자 인식 모델)

  • Lee, Yoonji;Lee, Jong-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.73-75
    • /
    • 2022
  • Scene Text Recognition is a technology used in the field of artificial intelligence that requires manless robot, automatic vehicles and human-computer interaction. Though scene text images are distorted by noise interference, such as illumination, low resolution and blurring. Unlike previous studies that recognized only English, this paper shows a strong recognition accuracy including various characters, English, Korean, special character and numbers. Instead of selecting only one class having the highest probability value, a candidate word can be generated by considering the probability value of the second rank as well, thus a method can be corrected an existing language misrecognition problem.

  • PDF